VulnerabilitiesHIGH

Orthanc DICOM Vulnerabilities - Crashes and RCE Risks

Featured image for Orthanc DICOM Vulnerabilities - Crashes and RCE Risks
#CVE-2026-5437#CVE-2026-5445#Orthanc#RCE#DICOM

Original Reporting

SWSecurityWeek·Ionut Arghire

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🛡️
🛡️ VULNERABILITY DETAILS
CVE IDCVE-2026-5445
CVSS Score7.5 / 10 (High)
Severity Rating
Affected ProductOrthanc DICOM Server
VendorOrthanc
Vulnerability TypeBuffer Overflow, Out-of-Bounds Read
Attack VectorRemote
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Actively ExploitedNot yet observed
Patch AvailableYes — version 1.12.11
Workaround Available
🎯

Basically, flaws in the Orthanc server can let hackers crash it or run harmful code.

Quick Summary

Nine vulnerabilities in the Orthanc DICOM server could allow hackers to crash systems or execute harmful code. Users must update to the latest version to stay secure.

What Happened

Nine vulnerabilities have been discovered in the open-source Digital Imaging and Communications in Medicine (DICOM) server, Orthanc. These flaws allow attackers to crash servers, leak sensitive data, and even execute arbitrary code remotely. The vulnerabilities are tracked from CVE-2026-5437 to CVE-2026-5445 and stem from issues like insufficient validation of metadata and unsafe arithmetic operations.

The Flaw

The first vulnerability is an out-of-bounds read issue affecting the meta-header parser. This occurs due to inadequate input validation in the parsing logic. Another critical flaw involves a GZIP decompression bomb, where the server allocates memory based on attacker-controlled metadata without any limits, potentially exhausting system memory.

A similar memory exhaustion vulnerability was identified in ZIP archive processing. Here, the server trusts the metadata describing the uncompressed size of archived files, allowing attackers to manipulate size values and cause excessive memory allocation during extraction.

What's at Risk

The HTTP server also suffers from vulnerabilities that allow memory allocation based on user-supplied header values. Attackers can craft HTTP requests with extremely large length values, which can terminate the server. Additionally, an out-of-bounds read vulnerability in the proprietary Philips Compression format can leak heap data into rendered images, posing further risks.

The most severe vulnerabilities are heap-based buffer overflows in the image parsing and decoding logic. These can crash the Orthanc process and may allow for remote code execution (RCE) under certain conditions.

Patch Status

Orthanc versions 1.12.10 and earlier are affected by these vulnerabilities. Users are strongly advised to update to version 1.12.11, which addresses all identified flaws. Researchers from Machine Spirits discovered these vulnerabilities and have published advisories detailing their findings.

Immediate Actions

To protect against these vulnerabilities, users should:

  • Update to Orthanc version 1.12.11 immediately.
  • Monitor for any unusual server behavior that may indicate exploitation attempts.
  • Review server configurations to ensure proper input validation and memory management practices are in place.

🔍 How to Check If You're Affected

  1. 1.Check the current version of Orthanc running on your server.
  2. 2.Review server logs for any signs of abnormal behavior or crashes.
  3. 3.Ensure that the latest security updates have been applied.

🏢 Impacted Sectors

Healthcare

Pro Insight

🔒 Pro insight: The vulnerabilities in Orthanc highlight critical flaws in memory management, necessitating immediate patching to prevent potential RCE exploits.

Sources

Original Report

SWSecurityWeek· Ionut Arghire
Read Original

Related Pings

HIGHVulnerabilities

GitHub Copilot - CamoLeak Vulnerability Exposes Sensitive Data

A newly discovered vulnerability in GitHub Copilot allows hackers to exfiltrate sensitive data from private repositories. Developers are urged to enhance security measures to protect their data. This incident highlights the risks of AI-assisted tools and the need for robust defenses.

Cyber Security News·
HIGHVulnerabilities

AI Router Vulnerabilities - Attackers Inject Malicious Code

A new study reveals vulnerabilities in AI routers that allow attackers to inject malicious code and steal sensitive data. This poses serious risks as AI agents handle critical tasks. Developers must implement stronger defenses against these threats.

Cyber Security News·
HIGHVulnerabilities

Chrome 147 Patches 60 Vulnerabilities, Two Critical Flaws

Google's Chrome 147 update fixes 60 vulnerabilities, including two critical flaws in WebML. Users must update their browsers to avoid potential exploits. Stay safe online!

SecurityWeek·
HIGHVulnerabilities

Critical Marimo Flaw Exploited Hours After Public Disclosure

A critical Marimo vulnerability was exploited within hours of disclosure, allowing unauthorized access and credential theft. Immediate action is required to mitigate risks.

SecurityWeek·
CRITICALVulnerabilities

AWS Patches Critical RCE and Privilege Escalation Flaws

AWS has released critical patches for vulnerabilities in its Research and Engineering Studio. These flaws could let attackers execute commands as root. Immediate updates are essential to safeguard sensitive data.

Cyber Security News·
HIGHVulnerabilities

Qualcomm Security Advisory - April 2026 Vulnerabilities

Qualcomm has issued a security bulletin for April 2026, highlighting vulnerabilities in its products. Users are urged to apply updates to protect their devices. Failing to do so may expose systems to significant risks.

Canadian Cyber Centre Alerts·