← Zuruck zu CVEs
CVE-2025-12699
MEDIUM5.5
Beschreibung
The ZOLL ePCR IOS application reflects unsanitized user input into a WebView. Attacker-controlled strings placed into PCR fields (run number, incident, call sign, notes) are interpreted as HTML/JS when the app prints or renders that content. In the proof of concept (POC), injected scripts return local file content, which would allow arbitrary local file reads from the app's runtime context. These local files contain device and user data within the ePCR medical application, and if exposed, would allow an attacker to access protected health information (PHI) or device telemetry.
CVE Details
CVSS v3.1 Bewertung5.5
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht2/10/2026
Zuletzt geandert2/10/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-538
Referenzen
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsma-26-041-01.json(ics-cert@hq.dhs.gov)
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-26-041-01(ics-cert@hq.dhs.gov)
https://www.zolldata.com/contact-us.(ics-cert@hq.dhs.gov)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.