Home

Description

The ZOLL ePCR IOS application reflects unsanitized user input into a WebView. Attacker-controlled strings placed into PCR fields (run number, incident, call sign, notes) are interpreted as HTML/JS when the app prints or renders that content. In the proof of concept (POC), injected scripts return local file content, which would allow arbitrary local file reads from the app's runtime context. These local files contain device and user data within the ePCR medical application, and if exposed, would allow an attacker to access protected health information (PHI) or device telemetry.

PUBLISHED Reserved 2025-11-04 | Published 2026-02-10 | Updated 2026-02-10 | Assigner icscert




MEDIUM: 6.7CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory

Product status

Default status
unaffected

2.6.7
affected

Credits

Bryan Riggins reported this vulnerability to ZOLL finder

References

www.cisa.gov/...vents/ics-medical-advisories/icsma-26-041-01

github.com/.../csaf_files/OT/white/2026/icsma-26-041-01.json

www.zolldata.com/contact-us.

cve.org (CVE-2025-12699)

nvd.nist.gov (CVE-2025-12699)

Download JSON