Cyber Posture

CVE-2025-30042

High

Published: 02 March 2026

Published
02 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 5.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-30042 is a high-severity Use of Client-Side Authentication (CWE-603) vulnerability in Cgm Clininet. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 5.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-2 (Identification and Authentication (Organizational Users)) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires the system to uniquely identify and authenticate organizational users using mechanisms that verify possession of the smart card private key, preventing bypass with certificate number alone.

prevent

Mandates management of authenticators like smart card certificates and private keys to ensure sufficient strength and proof of possession, directly countering reliance on static certificate numbers.

prevent

Enforces PKI certificate validation and authorized access to private keys, mitigating client-side authentication flaws that ignore private key possession.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1556.006 Multi-Factor Authentication Defense Impairment
Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts.
Why these techniques?

Local auth bypass via weak client-side cert check enables privilege escalation (T1068) and MFA bypass (T1556.006) from low-priv access.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

The CGM CLININET system provides smart card authentication; however, authentication is conducted locally on the client device, and, in reality, only the certificate number is used for access verification. As a result, possession of the certificate number alone is sufficient…

more

for authentication, regardless of the actual presence of the smart card or ownership of the private key.

Deeper analysisAI

CVE-2025-30042 is a vulnerability in the CGM CLININET system, which implements smart card authentication for access control. The authentication process is performed locally on the client device and verifies access using only the certificate number, rather than requiring the physical smart card or the associated private key. As a result, knowledge of the certificate number alone suffices for successful authentication. The issue carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-603.

A local attacker with low privileges (PR:L) on the affected client device can exploit this vulnerability with low complexity and no user interaction. By acquiring the certificate number, the attacker can bypass proper smart card authentication, gaining unauthorized access to the CGM CLININET system and achieving high impacts on confidentiality, integrity, and availability.

Advisories and product information related to mitigation are available from CERT.PL at https://cert.pl/en/posts/2026/03/CVE-2025-10350/ and the CGM CLININET product page at https://www.cgm.com/pol_pl/products/szpital/cgm-clininet.html. The vulnerability was published on 2026-03-02T12:16:01.087.

Details

CWE(s)

Affected Products

cgm
clininet
≤ 2025.ms2

CVEs Like This One

CVE-2025-58402Same product: Cgm Clininet
CVE-2026-1363Shared CWE-603
CVE-2025-24517Shared CWE-603
CVE-2025-12868Shared CWE-603
CVE-2025-61940Shared CWE-603

References