Overview
A critical security vulnerability, identified as CVE-2025-63958, has been discovered in MILLENSYS Vision Tools Workspace version 6.5.0.2585. This vulnerability allows unauthenticated attackers to access a sensitive configuration endpoint, exposing highly sensitive information that could lead to full system compromise. This endpoint reveals plaintext database credentials, file share paths, internal license server configuration details, and software update parameters.
Technical Details
The vulnerability lies in the lack of proper access controls on the /MILLENSYS/settings endpoint. This endpoint, intended for administrative purposes, is accessible without any authentication. By simply navigating to this URL, an attacker can retrieve a configuration file containing sensitive information. The disclosed information includes:
- Plaintext database credentials (username and password)
- File share paths used by the application
- Internal license server configuration
- Software update parameters
The root cause of this vulnerability is the missing authentication checks on this privileged administrative function.
CVSS Analysis
While the CVSS score is currently marked as N/A, the severity of this vulnerability is undoubtedly high. The potential impact of unauthorized access to the exposed information is significant. A more detailed CVSS analysis is pending. Given the nature of the exposed data, a high CVSS score is expected.
Possible Impact
The compromise resulting from CVE-2025-63958 could be devastating. An attacker with access to the exposed information can:
- Gain unauthorized access to the database, potentially stealing sensitive patient data or manipulating critical application data.
- Access file shares, potentially leading to data theft or the introduction of malware.
- Compromise the internal license server, disrupting the availability of the software.
- Manipulate software update parameters, potentially injecting malicious updates.
- Achieve full system compromise, gaining complete control over the affected system.
This vulnerability poses a significant risk to the confidentiality, integrity, and availability of the affected systems.
Mitigation or Patch Steps
Until a patch is released by MILLENSYS, the following mitigation steps are recommended:
- Restrict Network Access: Limit network access to the affected MILLENSYS Vision Tools Workspace server. Ensure that only authorized users can access the system.
- Web Application Firewall (WAF): Implement a Web Application Firewall (WAF) rule to block access to the
/MILLENSYS/settingsendpoint. - Monitor Access Logs: Monitor access logs for any unauthorized attempts to access the
/MILLENSYS/settingsendpoint. - Contact MILLENSYS Support: Contact MILLENSYS support immediately to inquire about a patch and request further guidance.
It is crucial to apply the official patch from MILLENSYS as soon as it becomes available.
