Home Microsoft CVE-2025-62575
Back to Microsoft

CVE-2025-62575

Microsoft SQL Server

Microsoft CVSS 8.3 Updated March 13, 2026

Executive Risk Summary

"NMIS/BioDose versions V22.02 and previous are vulnerable to remote code execution due to the default sysadmin role assigned to the SQL user account 'nmdbuser' and other created accounts. This vulnerability can be exploited through the use of certain built-in stored procedures, potentially leading to unauthorized access and control of the database."

Operational Audit Arsenal

Target Type Database Account
Target Asset nmdbuser
Standard Path %programfiles%Microsoft SQL ServerMSSQL{version}.MSSQLSERVERMSSQLDATA
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: nmdbuser (Database Account)
$Targets = 'nmdbuser'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely

Database services may be affected

Internal Work Notes

Vulnerability in Microsoft SQL Server database account configuration, requiring immediate attention to prevent potential remote code execution and data breaches.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.