PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-62575 Mirion Medical CVE debrief

CVE-2025-62575 affects Mirion Medical EC2 Software NMIS/BioDose V22.02 and earlier. According to CISA, the default SQL user account 'nmdbuser' and other created accounts have the sysadmin role, which can enable remote code execution through built-in Microsoft SQL Server stored procedures. Mirion Medical advises updating to V23.0 or later.

Vendor
Mirion Medical
Product
EC2 Software NMIS BioDose
CVSS
HIGH 8.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-12-02
Original CVE updated
2025-12-02
Advisory published
2025-12-02
Advisory updated
2025-12-02

Who should care

Organizations running Mirion Medical EC2 Software NMIS/BioDose, especially database administrators, OT/ICS operators, system administrators, and security teams responsible for SQL Server hardening and patching.

Technical summary

The advisory states that NMIS/BioDose V22.02 and previous versions rely on Microsoft SQL Server and that the 'nmdbuser' account, along with other created accounts, is granted sysadmin by default. The supplied CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L) indicates a network-exploitable issue requiring low privileges. With sysadmin-level SQL access, built-in stored procedures can be abused to reach remote code execution.

Defensive priority

High. The issue is rated CVSS 8.3 (HIGH) and impacts default database privileges in a product line used in medical/industrial contexts. Prioritize upgrading exposed or actively used installations, then verify SQL account privilege assignments.

Recommended defensive actions

  • Update Mirion Medical EC2 Software NMIS/BioDose to V23.0 or later.
  • If you have an active support contract, apply the latest vendor-provided update through the software or contact Mirion Medical support.
  • Review SQL Server accounts used by the application and remove unnecessary sysadmin privileges.
  • Audit for other default or created database accounts with elevated roles and restrict them to least privilege.
  • Validate that only required administrative access is allowed to the SQL Server hosting the application.
  • Use CISA ICS recommended practices and defense-in-depth guidance to harden and monitor the environment.

Evidence notes

This debrief uses only the supplied CISA CSAF advisory content, the embedded CVSS vector, the CVE record reference, and the vendor remediation statement. No exploit steps, reproduction details, or unsupported environmental assumptions are included.

Official resources

Publicly disclosed by CISA in ICSMA-25-336-01 on 2025-12-02, with initial publication and no later revision in the supplied timeline.