Santesoft Sante PACS Server
Santesoft Sante PACS Server versions prior to 4.2.3 contain multiple vulnerabilities including path traversal (CWE-22), use-after-free memory corruption (CWE-415), cleartext transmission of sensitive data (CWE-319), and reflected cross-site scripting (CWE-79). Successful exploitation could allow an attacker to create arbitrary files on the server, cause denial of service, obtain sensitive information, and steal session cookies to impersonate users. The vulnerabilities require only network access and no authentication.
- Network access to the Sante PACS Server web interface (typically port 80 or 443)
- No authentication required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d83ea878-a6d2-4afa-8e8f-96f0d1840b89Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.