An attacker could exploit this vulnerability by uploading arbitrary files via a specific service, which could lead to system compromise.
https://www.hipaajournal.com/infinitt-pacs-vulnerabilities-2025/
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-100-01
Source: Mitre, NVD
Published: 2025-04-11