CVE-2025-12699
Awaiting Analysis Awaiting Analysis - Queue
Cross-Site Scripting in ZOLL ePCR iOS Enables PHI Exposure

Publication date: 2026-02-10

Last updated on: 2026-02-10

Assigner: ICS-CERT

Description
The ZOLL ePCR IOS application reflects unsanitized user input into a WebView. Attacker-controlled strings placed into PCR fields (run number, incident, call sign, notes) are interpreted as HTML/JS when the app prints or renders that content. In the proof of concept (POC), injected scripts return local file content, which would allow arbitrary local file reads from the app's runtime context. These local files contain device and user data within the ePCR medical application, and if exposed, would allow an attacker to access protected health information (PHI) or device telemetry.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-10
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
zoll epcr_ios_application *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-538 The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the ZOLL ePCR IOS application where unsanitized user input is reflected into a WebView component. Specifically, attacker-controlled strings placed into PCR fields such as run number, incident, call sign, and notes are interpreted as HTML or JavaScript when the app prints or renders that content.

This allows an attacker to inject scripts that can execute within the app's runtime context. In a proof of concept, these injected scripts were able to read local files containing device and user data.

Because these local files include protected health information (PHI) and device telemetry, the vulnerability enables unauthorized access to sensitive data.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to read local files on your device through the ePCR application, potentially exposing sensitive information.

The exposed data may include protected health information (PHI) and device telemetry, which could lead to privacy violations, data breaches, and unauthorized disclosure of confidential medical information.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart