Cybersecurity concept

Customer Security Newsletter - August 2025

Welcome to the August 2025 MEDITECH Customer Security Newsletter, where we provide you with information and resources to give you insight on security challenges facing your organization and the healthcare community as a whole. Here we endeavor to provide some good information to help you improve your organization's security posture. This data has been gleaned from the review of public records on file with CISA, H-ISAC and Health Sector Cybersecurity Coordination Center (HC3) alerts. Please note the Talk To Us section, as we would like to tailor future editions of the newsletter to address specific concerns.


Known Exploited Vulnerabilities

From July 8, 2025 until the writing of this bulletin, there have been 21 known exploited vulnerabilities added to CISA's list. They are CVE-2025-5777, CVE-2025-47812, CVE-2025-25257, CVE-2025-53770, CVE-2025-2775, CVE-2025-2776, CVE-2025-6558, CVE-2025-54309, CVE-2025-49704, CVE-2025-49706, CVE-2023-2533, CVE-2025-20337CVE-2025-20281, CVE-2020-25078, CVE-2020-25079, CVE-2022-40799, CVE-2025-8088, CVE-2007-0671, CVE-2013-3893, CVE-2025-8876, and CVE-2025-8875.

All of these additions are based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risks. When looking at the catalog, the CVEs are listed from most recently added by default and the list may be manipulated by using the provided filters. This list was most recently reviewed on August 14, 2025.


Vulnerabilities for Hospitals to Watch Out For

These significant vulnerabilities have been shown to have been weaponized in July and August 2025. Intelligence indicates a high degree of caution for hospital infrastructures.

  • CVE-2025-8088 (HIGH): WinRAR path traversal
  • CVE-2025-6218 (HIGH): RARLAB WinRAR directory traversal remote code execution
  • CVE-2025-53770 (CRITICAL): Microsoft SharePoint remote code execution
  • CVE-2025-53771 (MEDIUM): Microsoft SharePoint server spoofing
  • CVE-2025-5777 (CRITICAL): NetScaler ADC and NetScaler Gateway memory overread resulting from insufficient input validation

News

CISA and Partners Release Asset Inventory Guidance to Strengthen Operational Technology Security

CISA has released new guidance to help organizations, particularly those in critical infrastructure sectors, improve their cybersecurity posture by effectively identifying and managing their operational technology (OT) assets. Read more here... 

Historic Cybersecurity Law Is Up for Renewal

On July 15, 2025, H-ISAC linked an article noting the Cybersecurity Information Sharing Act of 2015 (CISA 2015), which has had crucial role in enabling information sharing to combat cyber threats, is up for renewal. Read more here...


Additional Resources


Talk to us!

We at MEDITECH would love to hear your feedback about this newsletter and we’d like to know what is on your mind. Is there something you would like us to address?

We also have a question for you that is important to us. What are your largest concerns or security hopes for 2025?

Please let us know by contacting us!

Until next time, stay alert out there!