CVE-2025-62575
Published: 02 December 2025
Summary
CVE-2025-62575 is a high-severity Incorrect Permission Assignment for Critical Resource (CWE-732) vulnerability in Mirion Biodose\/Nmis. Its CVSS base score is 8.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked in the top 49.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces least privilege by ensuring database accounts like 'nmdbuser' are not assigned excessive sysadmin roles, directly preventing remote code execution via built-in stored procedures.
Manages account provisioning, privilege assignment, and periodic reviews to avoid defaulting application SQL accounts to sysadmin roles that enable exploitation.
Establishes and enforces secure baseline configuration settings for databases, mitigating default sysadmin role assignments in NMIS/BioDose deployments.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability grants sysadmin privileges to SQL accounts, enabling remote code execution via built-in stored procedures on Microsoft SQL Server, directly mapping to Exploitation of Remote Services.
NVD Description
NMIS/BioDose V22.02 and previous versions rely on a Microsoft SQL Server database. The SQL user account 'nmdbuser' and other created accounts by default have the sysadmin role. This can lead to remote code execution through the use of certain built-in…
more
stored procedures.
Deeper analysisAI
CVE-2025-62575 is a vulnerability in NMIS/BioDose versions V22.02 and earlier, which rely on a Microsoft SQL Server database. By default, the SQL user account 'nmdbuser' and other created accounts are assigned the sysadmin role, enabling remote code execution through certain built-in stored procedures. The issue stems from incorrect permission assignment (CWE-732) and carries a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).
An attacker requires low privileges, such as access to an affected SQL account, to exploit the vulnerability remotely over the network with low complexity and no user interaction. Exploitation allows high confidentiality and integrity impacts, with low availability disruption, culminating in remote code execution on the SQL Server.
Mitigation details are provided in the CISA ICS Medical Advisory ICSMA-25-336-01 at https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-336-01.
Details
- CWE(s)