Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK

0
Medium
VulnerabilityCVE-2025-14841cvecve-2025-14841
Published: Thu Dec 18 2025 (12/18/2025, 00:02:08 UTC)
Source: CVE Database V5
Vendor/Project: OFFIS
Product: DCMTK

Description

A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the function DcmQueryRetrieveIndexDatabaseHandle::startFindRequest/DcmQueryRetrieveIndexDatabaseHandle::startMoveRequest in the library dcmqrdb/libsrc/dcmqrdbi.cc of the component dcmqrscp. This manipulation causes null pointer dereference. The attack requires local access. Upgrading to version 3.7.0 is sufficient to resolve this issue. Patch name: ffb1a4a37d2c876e3feeb31df4930f2aed7fa030. You should upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:02:46 UTC

Technical Analysis

CVE-2025-14841 identifies a null pointer dereference vulnerability in the OFFIS DCMTK library, specifically within the DcmQueryRetrieveIndexDatabaseHandle class's startFindRequest and startMoveRequest functions in the dcmqrscp component. DCMTK is a widely used open-source toolkit for handling DICOM medical imaging data and services. The flaw arises when these functions improperly handle certain input or state conditions, leading to dereferencing a null pointer, which causes the application to crash or behave unpredictably. This vulnerability requires local attacker access to the system running the vulnerable DCMTK versions (3.6.0 through 3.6.9). No user interaction or elevated privileges beyond local access are necessary, and the flaw does not impact confidentiality or integrity directly but affects availability by causing denial of service. The vulnerability has a CVSS 4.8 (medium) score, reflecting its moderate impact and limited attack vector. The issue is fixed in version 3.7.0 of DCMTK, and the patch is identified by commit ffb1a4a37d2c876e3feeb31df4930f2aed7fa030. No known exploits have been reported in the wild, but the vulnerability could be leveraged by insiders or attackers with local access to disrupt medical imaging services.

Potential Impact

The primary impact of this vulnerability is denial of service due to application crashes caused by null pointer dereference. Organizations relying on DCMTK for DICOM query/retrieve services, especially in healthcare environments, may experience interruptions in medical imaging workflows, potentially delaying diagnosis or treatment. Since DCMTK is often integrated into PACS (Picture Archiving and Communication Systems) and other medical imaging infrastructure, this could affect hospital operations and patient care. The requirement for local access limits remote exploitation, reducing the risk of widespread attacks, but insider threats or compromised local accounts could exploit this flaw. The vulnerability does not directly compromise patient data confidentiality or integrity but impacts system availability, which is critical in healthcare settings. Given the specialized nature of DCMTK, the impact is mostly confined to healthcare providers, medical device manufacturers, and related service providers.

Mitigation Recommendations

Organizations should upgrade all affected DCMTK instances to version 3.7.0 or later to fully remediate this vulnerability. Until the upgrade is applied, restrict local access to systems running DCMTK to trusted personnel only, and monitor for unusual application crashes or service disruptions related to dcmqrscp. Implement strict access controls and auditing on systems hosting DCMTK to detect and prevent unauthorized local access. Consider deploying application-level monitoring to detect abnormal behavior in DICOM query/retrieve operations. Additionally, review and harden the underlying operating system and network segmentation to limit the attack surface. For environments where immediate upgrade is not feasible, applying runtime protections such as memory safety tools or sandboxing the DCMTK processes may reduce risk. Finally, maintain up-to-date backups and incident response plans to quickly recover from any denial of service incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-17T17:45:16.548Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69434d1ff4a1ba78f2c14a13

Added to database: 12/18/2025, 12:38:55 AM

Last enriched: 2/24/2026, 11:02:46 PM

Last updated: 3/23/2026, 11:51:00 PM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses