Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42845: n/a

0
High
VulnerabilityCVE-2024-42845cvecve-2024-42845
Published: Fri Aug 23 2024 (08/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-42845 is a high-severity code injection vulnerability in the InVesalius medical imaging software, specifically in the DICOM file reader component. It allows attackers with limited privileges and requiring user interaction to execute arbitrary code by loading a crafted DICOM file. This vulnerability impacts confidentiality, integrity, and availability of affected systems. Although no known exploits are currently reported in the wild, the ease of exploitation and critical impact make it a significant threat. European healthcare organizations using InVesalius are at risk, especially those handling sensitive medical imaging data. Mitigation requires applying patches once available, restricting file sources, and enhancing input validation. Countries with advanced healthcare infrastructures and widespread use of open-source medical imaging tools are most likely affected. The CVSS score of 8. 0 reflects the high risk posed by this vulnerability.

AI-Powered Analysis

AILast updated: 02/13/2026, 17:34:06 UTC

Technical Analysis

CVE-2024-42845 is an eval injection vulnerability identified in the InVesalius software, versions 3.1.99991 through 3.1.99998, specifically within the invesalius/reader/dicom.py component responsible for parsing DICOM files. The vulnerability arises because the software uses an unsafe eval function to process data from DICOM files, allowing an attacker to craft a malicious DICOM file that, when loaded, triggers arbitrary code execution on the host system. This type of vulnerability is classified under CWE-94 (Improper Control of Generation of Code), which is critical as it can lead to full system compromise. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), but does require privileges (PR:L) and user interaction (UI:R) to open the malicious file. The vulnerability affects confidentiality, integrity, and availability (all rated high), meaning attackers can steal sensitive patient data, alter imaging results, or disrupt system operations. No patches are currently listed, and no exploits are known in the wild, but the presence of an eval injection in a medical imaging context is highly concerning due to the sensitivity of healthcare data and the critical nature of medical devices and software. The vulnerability was published on August 23, 2024, and is tracked under CVE-2024-42845.

Potential Impact

For European organizations, particularly healthcare providers and medical research institutions, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive patient imaging data, manipulation of diagnostic images, or disruption of medical workflows, potentially endangering patient safety. The confidentiality breach could violate GDPR regulations, leading to legal and financial repercussions. Integrity compromise might result in incorrect diagnoses or treatment plans. Availability impact could disrupt critical healthcare services. Since InVesalius is an open-source medical imaging tool used in various European hospitals and research centers, the threat surface is notable. The requirement for user interaction means social engineering or phishing campaigns could be used to deliver malicious DICOM files. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score indicates urgent attention is needed.

Mitigation Recommendations

Organizations should immediately audit their use of InVesalius software and restrict the loading of DICOM files from untrusted or unauthenticated sources. Implement strict file validation and sandboxing techniques to isolate the DICOM processing environment. Monitor for suspicious file activity and user behavior related to medical imaging software. Since no official patches are currently available, consider disabling or limiting the use of the vulnerable component until a fix is released. Educate staff on the risks of opening files from unknown sources and implement multi-factor authentication to reduce the risk of privilege escalation. Collaborate with InVesalius developers or community to track patch releases and apply updates promptly. Additionally, employ endpoint detection and response (EDR) solutions capable of detecting anomalous code execution patterns related to eval injection. Regularly back up critical data and maintain incident response plans tailored to healthcare environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698f5d11c9e1ff5ad84e392e

Added to database: 2/13/2026, 5:19:13 PM

Last enriched: 2/13/2026, 5:34:06 PM

Last updated: 2/13/2026, 6:19:55 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats