CVE Alert: CVE-2025-30398 – Microsoft – Nuance PowerScribe 360 version 4.0.5

CVE-2025-30398

HIGHNo exploitation known

Missing authorization in Nuance PowerScribe allows an unauthorized attacker to disclose information over a network.

CVSS v3.1 (8.1)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Nuance PowerScribe 360 version 4.0.5, Nuance PowerScribe 360 version 4.0.8, Nuance PowerScribe 360 version 4.0.9, Nuance PowerScribe 360 version 4.0.6, Nuance PowerScribe 360 version 4.0.7, Nuance PowerScribe One version 2019.3, Nuance PowerScribe One version 2019.2, Nuance PowerScribe One version 2019.1, Nuance PowerScribe 360 version 4.0.1, Nuance PowerScribe 360 version 4.0.2, Nuance PowerScribe 360 version 4.0.3, Nuance PowerScribe 360 version 4.0.4, Nuance PowerScribe One version 2019.5, Nuance PowerScribe One version 2019.4, Nuance PowerScribe One version 2019.6, Nuance PowerScribe One version 2019.8, Nuance PowerScribe One version 2019.7, Nuance PowerScribe One version 2019.9, Nuance PowerScribe One version 2019.10, PowerScribe One version 2023.1 SP2 Patch 7
Versions
4.0.5 lt 7.0.243.17 | 4.0.8 lt 7.0.427.13 | 4.0.9 lt 7.0.528.18 | 4.0.6 lt 7.0.277.26 | 4.0.7 lt 7.0.316.9 | 2019.3 lt 2019.3.16.20 | 2019.2 lt 2019.2.9.8 | 2019.1 lt 2019.1.96.5 | 4.0.1 lt 7.0.111.66 | 4.0.2 lt 7.0.154.16 | 4.0.3 lt 7.0.197.8 | 4.0.4 lt 7.0.212.9 | 2019.5 lt 2019.5.14.39 | 2019.4 lt 2019.4.9.16 | 2019.6 lt 2019.6.36.39 | 2019.8 lt 2019.8.43.15 | 2019.7 lt 2019.7.107.21 | 2019.9 lt 2019.9.31.19 | 2019.10 lt 2019.10.36.4 | 2023.1 lt 2023.2.3027.0
CWE
CWE-862, CWE-862: Missing Authorization
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
Published
2025-11-11T17:59:51.398Z
Updated
2025-11-11T17:59:51.398Z

AI Summary Analysis

Risk verdict

High-severity information-disclosure with remote network exposure; exploitation requires user interaction, but the impact can be significant. KEV/EPSS signals are not provided; treat as priority 1 if those indicators later show exploitation potential.

Why this matters

Exposed healthcare data can include sensitive patient information; an attacker could exfiltrate disclosures from PowerScribe servers, undermining patient confidentiality and regulatory compliance. Realistic attacker goals include data theft, credential harvesting, or facilitating follow-on intrusions within clinical workflows.

Most likely attack path

Attacker can reach vulnerable PowerScribe services over the network; no privileges are required, but user interaction is needed to trigger the disclosure. Initial access could be opportunistic via phishing or compromised workstation activity; once triggered, sensitive information may be read and exfiltrated without requiring elevated rights, with limited preconditions for lateral movement.

Who is most exposed

Hospitals and radiology clinics deploying Nuance PowerScribe 360 or PowerScribe One on‑premises or into connected networks are most at risk, especially where these services are reachable from the broader clinical or VPN network.

Detection ideas

  • Unusual read/access patterns to patient data from PowerScribe endpoints.
  • Data export spikes originating from Nuance services.
  • Access attempts from non-whitelisted or anomalous IPs targeting PowerScribe.
  • Logs showing successful information disclosure events without corresponding authorisations.
  • New or altered accounts/tokens linked to PowerScribe components.

Mitigation and prioritisation

  • Patch to the latest available version across all affected lines; apply vendor guidance promptly.
  • Enforce network segmentation and restrict PowerScribe exposure to authenticated segments only.
  • Implement strict access controls and MFA where feasible; monitor for anomalous reads/exports.
  • Augment logging and set up real-time alerts for unusual data access from the service.
  • Schedule rapid change management and testing cycles; communicate timelines to clinical staff. If KEV or EPSS indicate active exploitation, elevate to priority 1.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features