"value":"\u200bSoftneta MedDream PACS\u00a0stores usernames and passwords in plaintext. The plaintext storage could be abused by attackers to leak legitimate user\u2019s credentials.\n\n"
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-256 \u200bPlaintext Storage of a Password",
"value":"\n\n<p>\u200bSoftneta recommends users update to <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.softneta.com/files/meddreampacs/premium/230530/MedDream-PACS-Premium-7.2.9.820.exe\">v7.2.9.820</a> of MedDream PACS Server or patch their current system using <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.softneta.com/files/meddreampacs/premium/Fix-v230712.zip\">Fix-v230712</a>.</p><p>\u200bFor assistance or additional information about installing the software, please <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.softneta.com/contacts/\">contact Softneta</a> directly.</p>\n\n<br>"
}
],
"value":"\n\u200bSoftneta recommends users update to v7.2.9.820 https://www.softneta.com/files/meddreampacs/premium/230530/MedDream-PACS-Premium-7.2.9.820.exe \u00a0of MedDream PACS Server or patch their current system using Fix-v230712 https://www.softneta.com/files/meddreampacs/premium/Fix-v230712.zip .\n\n\u200bFor assistance or additional information about installing the software, please contact Softneta https://www.softneta.com/contacts/ \u00a0directly.\n\n\n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"\u200bNoam Moshe of Claroty Research reported these vulnerabilities to CISA."