• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

CISA Warns of Extreme Flaws in Nuclear Med Monitoring Software program

Admin by Admin
December 4, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Endpoint Safety
,
Governance & Threat Administration
,
Web of Issues Safety

Mirion Medical Says Bugs Are Fastened in New Launch of BioDose/NMIS Software program

Marianne Kolbasuk McGee (HealthInfoSec) •
December 3, 2025    

CISA Warns of Severe Flaws in Nuclear Med Tracking Software
CISA is warning about a number of vulnerabilities in BioDose/NMIS from EC2 Software program, an organization owned by Mirion Medical, which says the failings are fastened within the latest launch of the nuclear drugs stock monitoring software program. (Picture: Mirion)

U.S. federal authorities are warning that a number of high-severity vulnerabilities found in Mirion Medical Co. stock monitoring software program utilized by nuclear drugs and radiology departments might enable attackers to change program executables, remotely execute code and achieve entry to delicate data – if exploited.

See Additionally: Gartner Report | Magic Quadrant for SD-WAN

The Cybersecurity Infrastructure and Safety Company in an advisory Tuesday stated the vulnerabilities, reported to the company by an impartial researcher, have an effect on BioDose/NMIS software program variations previous to 23.0, a product of EC2 Software program, an organization acquired in 2023 by Atlanta-based Mirion Medical.

Mirion Medical, a radiation security expertise firm, in an announcement to Info Safety Media Group, stated it has addressed the problems cited within the CISA alert.

“As quickly as Mirion turned conscious of those vulnerabilities we took speedy motion to resolve them and supply our prospects with fixes on the earliest potential alternative,” a Mirion spokeswoman stated.

“We coordinated with CISA, our prospects and different entities in accordance with coordinated vulnerability disclosure course of finest practices. All fixes are addressed inside our newest launch of the software program, Model 23.”

CISA stated the affected Mirion merchandise are used worldwide. Mirion didn’t instantly reply to ISMG’s inquiry concerning the estimated variety of prospects that use the affected BioDose/NMIS software program.

The 5 BioDose/NMIS vulnerabilities flagged by CISA embody three “incorrect permission project for essential useful resource” points, plus one vulnerability involving “use of client-side authentication” and one other involving “use of hard-coded credentials.”

Incorrect Permission Task Flaws

The inaccurate permission project for essential useful resource flaws embody CVE-2025-64642, which has a calculated CVSS v3.1 base rating of 8.0, and a CVSS v4 rating of seven.1.

CISA stated that concern pertains to listing paths in BioDose/NMIS V22.02 and former variations that by default have insecure file permissions, “which in sure deployment situations can allow customers on consumer workstations to change this system executables and libraries.”

The second incorrect permission project for essential useful resource vulnerability, CVE-2025-64298, has a calculated CVSS v3.1 base rating of 8.4 and a CVSS v4 base rating of 8.6.

CISA stated the BioDose/NMIS V22.02 and former model installations by which the embedded Microsoft SQL Server Categorical is used are uncovered within the Home windows share accessed by shoppers in networked environments. “By default, this listing has insecure listing paths that enable entry to the SQL Server database and configuration recordsdata, which may include delicate information,” CISA stated.

The third incorrect permission project for essential useful resource vulnerability is assigned as CVE-2025-62575. That flaw has been calculated as having a CVSS v3.1 base rating of 8.3 and a CVSS v4 base rating of 8.7.

The difficulty impacts BioDose/NMIS V22.02 and former variations that depend on a Microsoft SQL Server database. “The SQL consumer account ‘nmdbuser’ and different created accounts by default have the sysadmin position. This could result in distant code execution by means of using sure built-in saved procedures,” CISA stated.

Different Vulnerabilities

The usage of a client-side authentication vulnerability recognized in BioDose/NMIS model 22.02 is assigned as CVE-2025-61940 and has been calculated to have a CVSS v3.1 base rating of 8.3, and a CVSS v4 base rating of 8.7.

CISA stated the BioDose/NMIS V22.02 and former variations depend on a standard SQL Server consumer account to entry information within the database. “Consumer entry within the consumer utility is restricted by a password authentication verify within the consumer software program however the underlying database connection at all times has entry,” CISA stated. The newest model of BioDose/NMIS “introduces an choice to make use of Home windows consumer authentication with the database, which might limit this database connection,” the alert provides.

The final vulnerability, assigned CVE-2025-64778, entails use of hard-coded credentials.

CISA stated BioDose/NMIS software program V22.02 and former variations include executable binaries with plain textual content hard-coded passwords. “These hard-coded passwords might enable unauthorized entry to each the applying and database.”

This vulnerability has a calcuated CVSS v3.1 base rating of seven.3 and a CVSS v4 base rating of 8.4.



Tags: CISAFlawsMedNuclearsevereSoftwaretrackingWarns
Admin

Admin

Next Post
They know what you need, and it is bloody disgusting: Love and Deepspace’s newest Fable introduces Vampire Sylus

They know what you need, and it is bloody disgusting: Love and Deepspace's newest Fable introduces Vampire Sylus

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

A Sneak Peek Into 2026

A Sneak Peek Into 2026

April 11, 2026
Learn how to Create an Website positioning Report That Wins Belief (and Budgets)

Learn how to Create an Website positioning Report That Wins Belief (and Budgets)

July 4, 2025

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

March 29, 2026
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Efecto: Constructing Actual-Time ASCII and Dithering Results with WebGL Shaders

Efecto: Constructing Actual-Time ASCII and Dithering Results with WebGL Shaders

January 5, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Gemini 2.5 Professional Preview: even higher coding efficiency

Gemini 2.5 Professional Preview: even higher coding efficiency

April 12, 2026
Advertising forecast fundamentals each progress group wants

Advertising forecast fundamentals each progress group wants

April 12, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved