Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24793: CWE-416: Use After Free in Imaging Data Commons libdicom

0
High
VulnerabilityCVE-2024-24793cvecve-2024-24793cwe-416
Published: Tue Feb 20 2024 (02/20/2024, 10:37:15 UTC)
Source: CVE Database V5
Vendor/Project: Imaging Data Commons
Product: libdicom

Description

A use-after-free vulnerability exists in the DICOM Element Parsing as implemented in Imaging Data Commons libdicom 1.0.5. A specially crafted DICOM file can cause premature freeing of memory that is used later. To trigger this vulnerability, an attacker would need to induce the vulnerable application to process a malicious DICOM image.The Use-After-Free happens in the `parse_meta_element_create()` parsing the elements in the File Meta Information header.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:01:08 UTC

Technical Analysis

CVE-2024-24793 is a use-after-free vulnerability classified under CWE-416 found in Imaging Data Commons libdicom version 1.0.5. The flaw exists in the function parse_meta_element_create(), which handles parsing of elements within the File Meta Information header of DICOM files. When processing a specially crafted malicious DICOM file, the vulnerable code prematurely frees memory that is subsequently accessed, leading to a use-after-free condition. This memory misuse can result in undefined behavior, including potential arbitrary code execution, memory corruption, or application crashes. The vulnerability is exploitable remotely without requiring any privileges or user interaction, as it only requires the vulnerable application to process the malicious DICOM image. The CVSS v3.1 base score of 8.1 reflects the high impact on confidentiality, integrity, and availability, though the attack complexity is high due to the need for a crafted DICOM file and the requirement that the vulnerable libdicom version is in use. No patches or known exploits are currently reported, but the risk is significant given the critical role of DICOM in medical imaging workflows. The vulnerability highlights the importance of secure parsing and memory management in healthcare software components.

Potential Impact

The impact on European organizations, especially those in the healthcare sector, can be severe. Medical imaging systems relying on libdicom 1.0.5 are vulnerable to remote exploitation that can lead to arbitrary code execution, potentially allowing attackers to compromise patient data confidentiality, alter imaging results (integrity), or disrupt availability of critical diagnostic services. Such disruptions could delay patient care or lead to misdiagnosis. Given the widespread use of DICOM standards in European hospitals, radiology centers, and diagnostic labs, exploitation could affect large numbers of patients and healthcare providers. Additionally, compromised imaging systems could serve as a foothold for broader network intrusion, threatening hospital IT infrastructure. The absence of known exploits currently provides a window for mitigation, but the high severity score necessitates urgent attention. Regulatory compliance frameworks like GDPR also impose strict requirements on protecting patient data, increasing the legal and financial risks of exploitation.

Mitigation Recommendations

1. Monitor for and apply security updates from Imaging Data Commons or libdicom maintainers as soon as patches addressing CVE-2024-24793 are released. 2. Until patches are available, implement strict input validation and sanitization on all DICOM files before processing, potentially using sandboxed or isolated environments to handle untrusted files. 3. Employ network segmentation to isolate medical imaging systems from broader hospital networks, limiting lateral movement if exploitation occurs. 4. Use runtime memory protection techniques such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) on systems running libdicom. 5. Conduct regular security audits and penetration testing focused on medical imaging workflows to detect anomalous behavior. 6. Train staff on the risks of processing untrusted DICOM files and establish procedures to verify file provenance. 7. Maintain comprehensive logging and monitoring to detect exploitation attempts early. 8. Collaborate with vendors and healthcare cybersecurity communities to share threat intelligence and mitigation strategies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-01-30T17:12:10.381Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a475d6d939959c8022d60

Added to database: 11/4/2025, 6:35:09 PM

Last enriched: 11/4/2025, 7:01:08 PM

Last updated: 12/19/2025, 6:51:28 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats