CVE-2025-11266: CWE-787 Out-of-bounds Write in Grassroots DICOM (GDCM)
An out-of-bounds write vulnerability exists in the Grassroots DICOM library (GDCM). The issue is triggered during parsing of a malformed DICOM file containing encapsulated PixelData fragments (compressed image data stored as multiple fragments). This vulnerability leads to a segmentation fault caused by an out-of-bounds memory access due to unsigned integer underflow in buffer indexing. It is exploitable via file input, simply opening a crafted malicious DICOM file is sufficient to trigger the crash, resulting in a denial-of-service condition.
AI Analysis
Technical Summary
CVE-2025-11266 is an out-of-bounds write vulnerability classified under CWE-787 found in the Grassroots DICOM (GDCM) library, a widely used open-source toolkit for handling DICOM medical imaging files. The flaw is triggered during the parsing of DICOM files containing encapsulated PixelData fragments, which represent compressed image data stored as multiple fragments. Specifically, the vulnerability results from an unsigned integer underflow in buffer indexing logic when processing these fragments, causing an out-of-bounds memory write. This memory corruption leads to a segmentation fault, crashing the application and resulting in a denial-of-service (DoS) condition. Exploitation requires only that a user or system component opens a specially crafted malicious DICOM file, with no authentication or elevated privileges needed, and minimal user interaction (opening the file). The CVSS 4.0 score is 6.8 (medium severity), reflecting the local attack vector (file input), low complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality and integrity minimally but has a high impact on availability due to service crashes. No patches are currently linked, and no known exploits have been reported in the wild. Given the critical role of DICOM files in medical imaging workflows, this vulnerability poses a risk to healthcare environments relying on GDCM for image processing and viewing.
Potential Impact
For European organizations, particularly healthcare providers and medical imaging centers, this vulnerability can cause significant disruption. The denial-of-service condition may interrupt diagnostic workflows, delay patient care, and reduce availability of imaging services. While it does not allow remote code execution or data exfiltration, the loss of availability in critical medical systems can have severe operational and patient safety consequences. Hospitals and clinics using software that integrates GDCM for DICOM parsing are at risk if they process untrusted or externally sourced DICOM files. Additionally, healthcare research institutions and medical device manufacturers in Europe that utilize GDCM could face service interruptions. The impact is heightened in countries with advanced healthcare infrastructure and widespread use of open-source DICOM libraries. Disruptions could also affect compliance with healthcare regulations requiring system availability and data integrity.
Mitigation Recommendations
European healthcare organizations should implement strict controls on the provenance and validation of DICOM files, restricting file sources to trusted entities only. Employ sandboxing or isolated environments for opening untrusted DICOM files to contain potential crashes. Monitor and log application crashes related to DICOM processing to detect exploitation attempts. Since no official patches are currently available, organizations should track vendor advisories and apply updates promptly once released. Consider using alternative DICOM libraries or updated versions of GDCM that address this vulnerability. Implement robust input validation and fuzz testing in custom software that integrates GDCM. Network segmentation of medical imaging systems can limit exposure. Training staff to recognize suspicious files and avoid opening unknown DICOM files can reduce risk. Finally, maintain comprehensive backups and incident response plans to recover from potential service disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-11266: CWE-787 Out-of-bounds Write in Grassroots DICOM (GDCM)
Description
An out-of-bounds write vulnerability exists in the Grassroots DICOM library (GDCM). The issue is triggered during parsing of a malformed DICOM file containing encapsulated PixelData fragments (compressed image data stored as multiple fragments). This vulnerability leads to a segmentation fault caused by an out-of-bounds memory access due to unsigned integer underflow in buffer indexing. It is exploitable via file input, simply opening a crafted malicious DICOM file is sufficient to trigger the crash, resulting in a denial-of-service condition.
AI-Powered Analysis
Technical Analysis
CVE-2025-11266 is an out-of-bounds write vulnerability classified under CWE-787 found in the Grassroots DICOM (GDCM) library, a widely used open-source toolkit for handling DICOM medical imaging files. The flaw is triggered during the parsing of DICOM files containing encapsulated PixelData fragments, which represent compressed image data stored as multiple fragments. Specifically, the vulnerability results from an unsigned integer underflow in buffer indexing logic when processing these fragments, causing an out-of-bounds memory write. This memory corruption leads to a segmentation fault, crashing the application and resulting in a denial-of-service (DoS) condition. Exploitation requires only that a user or system component opens a specially crafted malicious DICOM file, with no authentication or elevated privileges needed, and minimal user interaction (opening the file). The CVSS 4.0 score is 6.8 (medium severity), reflecting the local attack vector (file input), low complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality and integrity minimally but has a high impact on availability due to service crashes. No patches are currently linked, and no known exploits have been reported in the wild. Given the critical role of DICOM files in medical imaging workflows, this vulnerability poses a risk to healthcare environments relying on GDCM for image processing and viewing.
Potential Impact
For European organizations, particularly healthcare providers and medical imaging centers, this vulnerability can cause significant disruption. The denial-of-service condition may interrupt diagnostic workflows, delay patient care, and reduce availability of imaging services. While it does not allow remote code execution or data exfiltration, the loss of availability in critical medical systems can have severe operational and patient safety consequences. Hospitals and clinics using software that integrates GDCM for DICOM parsing are at risk if they process untrusted or externally sourced DICOM files. Additionally, healthcare research institutions and medical device manufacturers in Europe that utilize GDCM could face service interruptions. The impact is heightened in countries with advanced healthcare infrastructure and widespread use of open-source DICOM libraries. Disruptions could also affect compliance with healthcare regulations requiring system availability and data integrity.
Mitigation Recommendations
European healthcare organizations should implement strict controls on the provenance and validation of DICOM files, restricting file sources to trusted entities only. Employ sandboxing or isolated environments for opening untrusted DICOM files to contain potential crashes. Monitor and log application crashes related to DICOM processing to detect exploitation attempts. Since no official patches are currently available, organizations should track vendor advisories and apply updates promptly once released. Consider using alternative DICOM libraries or updated versions of GDCM that address this vulnerability. Implement robust input validation and fuzz testing in custom software that integrates GDCM. Network segmentation of medical imaging systems can limit exposure. Training staff to recognize suspicious files and avoid opening unknown DICOM files can reduce risk. Finally, maintain comprehensive backups and incident response plans to recover from potential service disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-10-03T15:37:16.725Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693c821af55ccbd2c7950af7
Added to database: 12/12/2025, 8:59:06 PM
Last enriched: 12/12/2025, 9:13:22 PM
Last updated: 12/15/2025, 1:49:24 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14695: Dynamically-Managed Code Resources in SamuNatsu HaloBot
MediumCVE-2025-14694: SQL Injection in ketr JEPaaS
MediumCVE-2025-14693: Symlink Following in Ugreen DH2100+
HighCVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
MediumCVE-2025-14692: Open Redirect in Mayan EDMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.