CVE-2025-30042
Published: 02 March 2026
Summary
CVE-2025-30042 is a high-severity Use of Client-Side Authentication (CWE-603) vulnerability in Cgm Clininet. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 5.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-2 (Identification and Authentication (Organizational Users)) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires the system to uniquely identify and authenticate organizational users using mechanisms that verify possession of the smart card private key, preventing bypass with certificate number alone.
Mandates management of authenticators like smart card certificates and private keys to ensure sufficient strength and proof of possession, directly countering reliance on static certificate numbers.
Enforces PKI certificate validation and authorized access to private keys, mitigating client-side authentication flaws that ignore private key possession.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local auth bypass via weak client-side cert check enables privilege escalation (T1068) and MFA bypass (T1556.006) from low-priv access.
NVD Description
The CGM CLININET system provides smart card authentication; however, authentication is conducted locally on the client device, and, in reality, only the certificate number is used for access verification. As a result, possession of the certificate number alone is sufficient…
more
for authentication, regardless of the actual presence of the smart card or ownership of the private key.
Deeper analysisAI
CVE-2025-30042 is a vulnerability in the CGM CLININET system, which implements smart card authentication for access control. The authentication process is performed locally on the client device and verifies access using only the certificate number, rather than requiring the physical smart card or the associated private key. As a result, knowledge of the certificate number alone suffices for successful authentication. The issue carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-603.
A local attacker with low privileges (PR:L) on the affected client device can exploit this vulnerability with low complexity and no user interaction. By acquiring the certificate number, the attacker can bypass proper smart card authentication, gaining unauthorized access to the CGM CLININET system and achieving high impacts on confidentiality, integrity, and availability.
Advisories and product information related to mitigation are available from CERT.PL at https://cert.pl/en/posts/2026/03/CVE-2025-10350/ and the CGM CLININET product page at https://www.cgm.com/pol_pl/products/szpital/cgm-clininet.html. The vulnerability was published on 2026-03-02T12:16:01.087.
Details
- CWE(s)