PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-0572 Santesoft CVE debrief

CVE-2025-0572 is a network-reachable integrity issue in Santesoft Sante PACS Server's web portal. CISA's advisory says remote attackers can use DCM files to create arbitrary files on affected installations. The supplied CVSS v3.1 vector indicates low complexity, no user interaction, and low privileges, with integrity impact only. Santesoft's remediation is to update to Sante PACS Server 4.2.3 or later.

Vendor
Santesoft
Product
Sante PACS Server
CVSS
MEDIUM 4.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-08-12
Original CVE updated
2025-08-12
Advisory published
2025-08-12
Advisory updated
2025-08-12

Who should care

Healthcare IT and security teams, PACS administrators, and incident responders responsible for Santesoft Sante PACS Server deployments, especially systems that are reachable from broader internal or external networks.

Technical summary

The CISA CSAF advisory describes a flaw in the Sante PACS Server Web Portal where DCM files can be used to create arbitrary files on the server. The supplied CVSS v3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, which points to a remotely reachable issue that requires low privileges and no user interaction, with integrity impact but no confidentiality or availability impact in the provided assessment.

Defensive priority

Patch promptly, prioritizing exposed or clinically critical PACS deployments.

Recommended defensive actions

  • Update Sante PACS Server to version 4.2.3 or later using the vendor remediation guidance.
  • Restrict access to the PACS web portal to trusted networks and authenticated administrative users.
  • Monitor for unexpected file creation or modification in application and server directories.
  • Review file-system permissions and reduce write access for the application service account where operationally feasible.
  • Apply CISA ICS defense-in-depth and recommended practices for segmentation, access control, and recovery planning.

Evidence notes

This debrief is based only on the supplied CISA CSAF advisory ICSMA-25-224-01, which was published and modified on 2025-08-12, plus the official CVE and vendor remediation references included in the corpus. The corpus states that Sante PACS Server Web Portal allows remote attackers to use DCM files to create arbitrary files, and that Santesoft recommends updating to version 4.2.3 or later. No KEV entry, ransomware association, or exploit details are present in the supplied source set.

Official resources

CISA published ICSMA-25-224-01 and the corresponding CSAF source record on 2025-08-12. The supplied corpus does not list a Known Exploited Vulnerabilities entry or a ransomware-campaign association at that time.