CVE-2025-0896

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-0896
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-0896.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-0896
Downstream
Published
2025-02-13T02:15:29Z
Modified
2025-02-15T21:00:07Z
Summary
[none]
Details

Orthanc server prior to version 1.5.8 does not enable basic authentication by default when remote access is enabled. This could result in unauthorized access by an attacker.

References

Affected packages

Debian:11 / orthanc

Package

Name
orthanc
Purl
pkg:deb/debian/orthanc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.8+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / orthanc

Package

Name
orthanc
Purl
pkg:deb/debian/orthanc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.8+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / orthanc

Package

Name
orthanc
Purl
pkg:deb/debian/orthanc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.8+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}