PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-0896 Orthanc CVE debrief

CVE-2025-0896 affects Orthanc Server versions prior to 1.5.8. According to the CISA CSAF advisory, when remote access is enabled, basic authentication is not enabled by default, which can leave the service open to unauthorized access. The advisory rates the issue CVSS 9.8 (Critical). Orthanc advises updating to the latest version or explicitly enabling HTTP authentication by setting AuthenticationEnabled to true in the configuration file.

Vendor
Orthanc
Product
Unknown
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-02-06
Original CVE updated
2025-02-06
Advisory published
2025-02-06
Advisory updated
2025-02-06

Who should care

Administrators and operators of Orthanc Server deployments, especially any instance with remote access enabled or reachable from non-trusted networks.

Technical summary

The issue is a default-configuration weakness: Orthanc Server prior to 1.5.8 does not enable basic authentication automatically when remote access is enabled. The supplied CSAF advisory states this can allow unauthorized access. The published CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network reachability with no privileges or user interaction required and high impact if exploited.

Defensive priority

Critical. Because the vulnerable service can be reachable over the network and the advisory indicates no authentication by default in remote-access configurations, remediation should be treated as urgent.

Recommended defensive actions

  • Update Orthanc Server to the latest available version, or at minimum to 1.5.8 or later per the advisory.
  • If remote access must remain enabled, set "AuthenticationEnabled": true in the Orthanc configuration file.
  • Review all Orthanc deployments for exposed remote access and verify authentication is actually enforced.
  • Restrict network exposure to trusted management networks while remediation is being applied.
  • Validate access controls after updating by confirming unauthenticated requests are rejected.
  • Monitor the vendor download and advisory page for any follow-up guidance.

Evidence notes

Source corpus indicates CISA advisory ICSMA-25-037-02, published 2025-02-06, with the same CVE description and remediation guidance. The advisory states: "Orthanc server prior to version 1.5.8 does not enable basic authentication by default when remote access is enabled." The CSAF metadata also provides the CVSS v3.1 vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.

Official resources

Publicly disclosed by CISA in ICS Medical Advisory ICSMA-25-037-02 on 2025-02-06. No Known Exploited Vulnerabilities (KEV) listing was provided in the supplied data.