PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-53948 Santesoft CVE debrief

CVE-2025-53948 is a high-severity denial-of-service issue in Santesoft Sante PACS Server. According to the CISA advisory published on 2025-08-12, a remote attacker can send a crafted HL7 message that crashes the application's main thread. The affected service requires a manual restart, and no authentication is needed. Santesoft's recommended mitigation is to update PACS Server to version 4.2.3 or later.

Vendor
Santesoft
Product
Sante PACS Server
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-08-12
Original CVE updated
2025-08-12
Advisory published
2025-08-12
Advisory updated
2025-08-12

Who should care

Organizations running Santesoft Sante PACS Server, especially healthcare and imaging environments that rely on PACS availability. Security and operations teams responsible for HL7-integrated clinical systems should treat this as a service-impacting issue because unauthenticated remote traffic can interrupt availability.

Technical summary

The reported flaw is an unauthenticated network-reachable denial of service. A crafted HL7 message sent to Sante PACS Server can crash the main thread, stopping service until the application is manually restarted. The supplied advisory does not describe data corruption, code execution, or privilege escalation; the impact described is availability only.

Defensive priority

High for any exposed or operationally critical deployment. Because the attack is unauthenticated and can halt the PACS service, affected environments should prioritize patching and access restriction promptly, especially where downtime would affect clinical workflows.

Recommended defensive actions

  • Update Sante PACS Server to version 4.2.3 or later, per Santesoft's recommendation.
  • Restrict network exposure to PACS and HL7-facing services to trusted hosts and segments only.
  • Review monitoring and alerting for unexpected service crashes or restarts affecting PACS availability.
  • Coordinate downtime planning and validation testing before and after applying the update in production environments.

Evidence notes

The vulnerability description and remediation come from the CISA CSAF advisory for ICSMA-25-224-01 published on 2025-08-12. The source states that a crafted HL7 message can crash the main thread, requires a manual restart, and needs no authentication. The advisory also lists Santesoft's remediation to update PACS Server to version 4.2.3 or later.

Official resources

Publicly disclosed by CISA in ICSMA-25-224-01 on 2025-08-12. The advisory identifies Santesoft Sante PACS Server as affected and recommends updating to version 4.2.3 or later.