The ZOLL ePCR IOS application reflects unsanitized user input into a WebView. Attacker-controlled strings placed into PCR fields (run number, incident, call sign, notes) are interpreted as HTML/JS when the app prints or renders that content. In the proof of concept (POC), injected scripts return local file content, which would allow arbitrary local file reads from the app's runtime context. These local files contain device and user data within the ePCR medical application, and if exposed, would allow an attacker to access protected health information (PHI) or device telemetry.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The ZOLL ePCR IOS application reflects unsanitized user input into a WebView. Attacker-controlled strings placed into PCR fields (run number, incident, call sign, notes) are interpreted as HTML/JS when the app prints or renders that content. In the proof of concept (POC), injected scripts return local file content, which would allow arbitrary local file reads from the app's runtime context. These local files contain device and user data within the ePCR medical application, and if exposed, would allow an attacker to access protected health information (PHI) or device telemetry. | |
| Title | ZOLL ePCR IOS Mobile Application Insertion of Sensitive Information into Externally-Accessible File or Directory | |
| Weaknesses | CWE-538 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-02-10T20:38:37.838Z
Reserved: 2025-11-04T15:39:58.840Z
Link: CVE-2025-12699
No data.
Status : Awaiting Analysis
Published: 2026-02-10T21:15:59.187
Modified: 2026-02-10T21:51:48.077
Link: CVE-2025-12699
No data.
OpenCVE Enrichment
No data.