Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11266: CWE-787 Out-of-bounds Write in Grassroots DICOM (GDCM)

0
Medium
VulnerabilityCVE-2025-11266cvecve-2025-11266cwe-787
Published: Fri Dec 12 2025 (12/12/2025, 20:48:57 UTC)
Source: CVE Database V5
Vendor/Project: Grassroots
Product: DICOM (GDCM)

Description

An out-of-bounds write vulnerability exists in the Grassroots DICOM library (GDCM). The issue is triggered during parsing of a malformed DICOM file containing encapsulated PixelData fragments (compressed image data stored as multiple fragments). This vulnerability leads to a segmentation fault caused by an out-of-bounds memory access due to unsigned integer underflow in buffer indexing. It is exploitable via file input, simply opening a crafted malicious DICOM file is sufficient to trigger the crash, resulting in a denial-of-service condition.

AI-Powered Analysis

AILast updated: 12/12/2025, 21:13:22 UTC

Technical Analysis

CVE-2025-11266 is an out-of-bounds write vulnerability classified under CWE-787 found in the Grassroots DICOM (GDCM) library, a widely used open-source toolkit for handling DICOM medical imaging files. The flaw is triggered during the parsing of DICOM files containing encapsulated PixelData fragments, which represent compressed image data stored as multiple fragments. Specifically, the vulnerability results from an unsigned integer underflow in buffer indexing logic when processing these fragments, causing an out-of-bounds memory write. This memory corruption leads to a segmentation fault, crashing the application and resulting in a denial-of-service (DoS) condition. Exploitation requires only that a user or system component opens a specially crafted malicious DICOM file, with no authentication or elevated privileges needed, and minimal user interaction (opening the file). The CVSS 4.0 score is 6.8 (medium severity), reflecting the local attack vector (file input), low complexity, no privileges required, but requiring user interaction. The vulnerability impacts confidentiality and integrity minimally but has a high impact on availability due to service crashes. No patches are currently linked, and no known exploits have been reported in the wild. Given the critical role of DICOM files in medical imaging workflows, this vulnerability poses a risk to healthcare environments relying on GDCM for image processing and viewing.

Potential Impact

For European organizations, particularly healthcare providers and medical imaging centers, this vulnerability can cause significant disruption. The denial-of-service condition may interrupt diagnostic workflows, delay patient care, and reduce availability of imaging services. While it does not allow remote code execution or data exfiltration, the loss of availability in critical medical systems can have severe operational and patient safety consequences. Hospitals and clinics using software that integrates GDCM for DICOM parsing are at risk if they process untrusted or externally sourced DICOM files. Additionally, healthcare research institutions and medical device manufacturers in Europe that utilize GDCM could face service interruptions. The impact is heightened in countries with advanced healthcare infrastructure and widespread use of open-source DICOM libraries. Disruptions could also affect compliance with healthcare regulations requiring system availability and data integrity.

Mitigation Recommendations

European healthcare organizations should implement strict controls on the provenance and validation of DICOM files, restricting file sources to trusted entities only. Employ sandboxing or isolated environments for opening untrusted DICOM files to contain potential crashes. Monitor and log application crashes related to DICOM processing to detect exploitation attempts. Since no official patches are currently available, organizations should track vendor advisories and apply updates promptly once released. Consider using alternative DICOM libraries or updated versions of GDCM that address this vulnerability. Implement robust input validation and fuzz testing in custom software that integrates GDCM. Network segmentation of medical imaging systems can limit exposure. Training staff to recognize suspicious files and avoid opening unknown DICOM files can reduce risk. Finally, maintain comprehensive backups and incident response plans to recover from potential service disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-03T15:37:16.725Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c821af55ccbd2c7950af7

Added to database: 12/12/2025, 8:59:06 PM

Last enriched: 12/12/2025, 9:13:22 PM

Last updated: 12/15/2025, 1:49:24 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats