Description
During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
Published: 2025-03-13
Score: 9.8 Critical
EPSS: 3.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6300 During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00866}

epss

{'score': 0.01272}


Thu, 03 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Santesoft
Santesoft sante Pacs Server
Weaknesses CWE-787
CPEs cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*
Vendors & Products Santesoft
Santesoft sante Pacs Server

Fri, 14 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
Description During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
Title Santesoft Sante PACS Server Stack-based Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Santesoft Sante Pacs Server
cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2025-03-14T13:41:49.600Z

Reserved: 2025-03-12T18:58:09.027Z

Link: CVE-2025-2263

cve-icon Vulnrichment

Updated: 2025-03-14T13:41:38.244Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-13T17:15:38.617

Modified: 2025-04-03T18:20:38.627

Link: CVE-2025-2263

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses