Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27629: n/a

0
High
VulnerabilityCVE-2024-27629cvecve-2024-27629
Published: Fri Jun 28 2024 (06/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in dc2niix before v.1.0.20240202 allows a local attacker to execute arbitrary code via the generated file name is not properly escaped and injected into a system call when certain types of compression are used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:08:15 UTC

Technical Analysis

CVE-2024-27629 is a vulnerability identified in the dc2niix software, a tool commonly used for converting DICOM medical imaging files to NIfTI format. The flaw exists in versions before 1.0.20240202 and is related to improper escaping of generated file names that are subsequently passed into system calls during compression operations. Specifically, when certain compression types are applied, the software fails to sanitize the file name input, allowing an attacker with local access and limited privileges to inject arbitrary commands. This vulnerability is classified under CWE-116 (Improper Encoding or Escaping of Output), which typically leads to injection attacks. The CVSS v3.1 base score is 7.8, indicating a high severity due to the potential for full system compromise. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability poses a significant risk to environments where dc2niix is used, especially in healthcare settings handling sensitive medical data.

Potential Impact

The vulnerability allows local attackers to execute arbitrary code with the privileges of the dc2niix process, potentially leading to full system compromise. This can result in unauthorized access to sensitive medical imaging data, alteration or deletion of files, and disruption of medical workflows. Given dc2niix's role in medical imaging pipelines, exploitation could undermine patient data confidentiality and integrity, and impact availability of diagnostic services. Organizations relying on dc2niix in clinical or research environments face risks of data breaches, regulatory non-compliance, and operational downtime. The local attack vector limits remote exploitation but insider threats or compromised local accounts could leverage this flaw. The high impact on all security properties (confidentiality, integrity, availability) makes this a critical concern for healthcare providers and associated IT infrastructure.

Mitigation Recommendations

Organizations should immediately upgrade dc2niix to version 1.0.20240202 or later where the vulnerability is patched. If upgrading is not immediately feasible, restrict local access to systems running dc2niix to trusted users only and implement strict access controls and monitoring. Employ application whitelisting and endpoint detection to identify suspicious command executions. Review and harden system call usage policies and sanitize inputs in any custom scripts interacting with dc2niix outputs. Regularly audit local user privileges and remove unnecessary accounts to reduce attack surface. Additionally, isolate medical imaging processing environments from general user workstations to limit potential exploitation vectors. Maintain up-to-date backups of critical data to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d83b7ef31ef0b5817bd

Added to database: 2/25/2026, 9:45:39 PM

Last enriched: 2/26/2026, 11:08:15 AM

Last updated: 4/12/2026, 6:17:41 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses