Cyber Posture

CVE-2025-0569

High

Published: 30 January 2025

Published
30 January 2025
Modified
19 February 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0183 83.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0569 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Santesoft Sante Pacs Server. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-supplied data during DCM file parsing to prevent memory corruption from improper input handling.

prevent

Implements memory protections such as address space layout randomization and data execution prevention to mitigate out-of-bounds writes and memory corruption exploits.

prevent

Provides vulnerability scanning, flaw identification, and remediation processes to patch the specific DCM parsing memory corruption vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated exploitation of memory corruption in public-facing PACS server DCM parser directly enables T1190 for initial access resulting in DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within…

more

the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25303.

Deeper analysisAI

CVE-2025-0569 is a memory corruption vulnerability in the DCM file parsing component of Sante PACS Server. The flaw arises from insufficient validation of user-supplied data during DCM file processing, leading to a denial-of-service condition. Affected installations of Sante PACS Server are vulnerable, with the issue tracked as ZDI-CAN-25303 and assigned a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). It maps to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-787 (Out-of-bounds Write).

Remote attackers can exploit this vulnerability without authentication by sending a specially crafted DCM file to the server. Successful exploitation triggers memory corruption, resulting in a denial-of-service condition that disrupts server availability.

The Zero Day Initiative published details in advisory ZDI-25-052, available at https://www.zerodayinitiative.com/advisories/ZDI-25-052/.

Details

CWE(s)

Affected Products

santesoft
sante pacs server
≤ 4.0.10

CVEs Like This One

CVE-2025-0568Same product: Santesoft Sante Pacs Server
CVE-2025-0574Same product: Santesoft Sante Pacs Server
CVE-2025-2263Same product: Santesoft Sante Pacs Server
CVE-2025-2264Same product: Santesoft Sante Pacs Server
CVE-2025-2480Same vendor: Santesoft
CVE-2026-2940Shared CWE-119, CWE-787
CVE-2026-3703Shared CWE-119, CWE-787
CVE-2025-8159Shared CWE-119, CWE-787
CVE-2026-5213Shared CWE-119, CWE-787
CVE-2025-14135Shared CWE-119, CWE-787

References