Orthanc DICOM Vulnerabilities Lead to Crashes, RCE
Security WeekArchived Apr 10, 2026✓ Full text saved
Attackers could exploit these vulnerabilities in denial-of-service, information disclosure, and arbitrary code execution attacks. The post Orthanc DICOM Vulnerabilities Lead to Crashes, RCE appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
Nine vulnerabilities in the open source Digital Imaging and Communications in Medicine (DICOM) server Orthanc allow attackers to crash servers, leak data, and execute arbitrary code remotely.
A lightweight standalone DICOM server for healthcare and medical research, Orthanc supports the automated analysis of medical images and does not require complex database administration or third-party dependencies.
The nine security defects in Orthanc, tracked CVE-2026-5437 to CVE-2026-5445, are rooted in insufficient validation of metadata, missing checks, and unsafe arithmetic operations, CERT Coordination Center (CERT/CC) notes in an advisory.
The first bug is an out-of-bounds read issue affecting the meta-header parser, caused by insufficient input validation in the parsing logic.
Next is a GZIP decompression bomb flaw in the processing of specific HTTP requests. Because no limit is enforced on decompressed size, and memory is allocated based on attacker-controlled metadata, a malicious payload could be used to exhaust system memory.
Another memory exhaustion defect was discovered in ZIP archive processing, where the server trusts metadata describing the uncompressed size of the archived files, allowing an attacker to forge size values and cause the server to allocate extremely large buffers during extraction.
The HTTP server was also found to allocate memory directly based on user-supplied header values, allowing attackers to craft an HTTP request containing an extremely large length value, triggering server termination.
Orthanc’s decompression routine for the proprietary Philips Compression format is affected by an out-of-bounds read vulnerability, where escape markers at the end of the compressed data stream are improperly validated.
“A crafted sequence at the end of the buffer can cause the decoder to read beyond the allocated memory region and leak heap data into the rendered image output,” the CERT/CC advisory reads.
Another out-of-bounds read weakness was identified in the lookup-table decoding logic for Palette Color images, which fails to validate pixel indices. The flaw can be exploited via crafted images with indices larger than the palette size.
The last three security defects are heap buffer overflow issues impacting the image decoder, Palette Color image decoding logic, and PAM image parsing logic. Successful exploitation of these vulnerabilities could lead to out-of-bounds memory access.
“The most severe issues are heap-based buffer overflows in image parsing and decoding logic, which can crash the Orthanc process and may, under certain conditions, provide a pathway to remote code execution (RCE),” the CERT/CC advisory reads.
Orthanc versions 1.12.10 and earlier are affected by these bugs. Users are advised to update to version 1.12.11, which addresses all of them.
The vulnerabilities were discovered by researchers at Machine Spirits, who published their own advisories.
Related: Critical Marimo Flaw Exploited Hours After Public Disclosure
Related: Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users
Related: Data Leakage Vulnerability Patched in OpenSSL
Related: RCE Bug Lurked in Apache ActiveMQ Classic for 13 Years
WRITTEN BY
Ionut Arghire
Ionut Arghire is an international correspondent for SecurityWeek.
More from Ionut Arghire
Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities
Google Warns of New Campaign Targeting BPOs to Steal Corporate Data
300,000 People Impacted by Eurail Data Breach
RCE Bug Lurked in Apache ActiveMQ Classic for 13 Years
FBI: Cybercrime Losses Neared $21 Billion in 2025
Evasive Masjesu DDoS Botnet Targets IoT Devices
Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover
Trent AI Emerges From Stealth With $13 Million in Funding
Latest News
Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000
MITRE Releases Fight Fraud Framework
Critical Marimo Flaw Exploited Hours After Public Disclosure
Google Rolls Out Cookie Theft Protections in Chrome
Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users
Apple Intelligence AI Guardrails Bypassed in New Attack
Can We Trust AI? No – But Eventually We Must
Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access
Trending
Webinar: Securing Fragile OT In An Exposed World
March 10, 2026
Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.
Register
Webinar: Why Automated Pentesting Alone Is Not Enough
April 7, 2026
Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline.
Register
People on the Move
Black Duck has named Dom Glavach as Chief Information Security Officer.
Finite State has named Ann Miller as Vice President of Marketing.
Yael Nardi has joined Minimus as Chief Business Officer.
More People On The Move
Expert Insights
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
The New Rules Of Engagement: Matching Agentic Attack Speed
The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael)
The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin)
Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw
Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor)
The Human IOC: Why Security Professionals Struggle With Social Vetting
Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb)
Flipboard
Reddit
Whatsapp
Email