CVE-2025-9732: Memory Corruption in DCMTK
A vulnerability was identified in DCMTK up to 3.6.9. This affects an unknown function in the library dcmimage/include/dcmtk/dcmimage/diybrpxt.h of the component dcm2img. Such manipulation leads to memory corruption. Local access is required to approach this attack. The name of the patch is 7ad81d69b. It is best practice to apply a patch to resolve this issue.
AI Analysis
Technical Summary
CVE-2025-9732 is a medium-severity memory corruption vulnerability identified in the DCMTK (DICOM Toolkit) library versions up to 3.6.9. The vulnerability resides in an unspecified function within the header file diybrpxt.h, part of the dcm2img component responsible for image processing in the DICOM standard. Exploitation of this vulnerability requires local access and low privileges, meaning an attacker must have some level of access to the affected system but does not require elevated privileges or user interaction. The vulnerability can lead to memory corruption, which may cause application crashes, data corruption, or potentially enable further exploitation such as arbitrary code execution depending on the context and memory layout. The CVSS 4.0 base score is 4.8, reflecting a medium severity with local attack vector, low complexity, no user interaction, and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. A patch identified by commit 7ad81d69b has been released to address this issue, and applying this patch is recommended to mitigate the risk. DCMTK is widely used in medical imaging environments to handle DICOM files, which are standard in healthcare for storing and transmitting medical images. The vulnerability’s impact is therefore primarily relevant to healthcare organizations and any entities processing DICOM images using affected DCMTK versions.
Potential Impact
For European organizations, particularly those in the healthcare sector, this vulnerability poses a risk to the integrity and availability of medical imaging systems. Exploitation could disrupt diagnostic workflows by causing application crashes or corrupting image data, potentially delaying patient care or leading to misdiagnosis. Although the vulnerability requires local access, insider threats or compromised internal systems could leverage this flaw to escalate privileges or execute arbitrary code, further compromising sensitive patient data and system integrity. Given the critical role of medical imaging in healthcare delivery and the strict regulatory environment in Europe (e.g., GDPR, NIS Directive), any compromise or disruption could have significant operational, legal, and reputational consequences. Additionally, healthcare providers often operate interconnected systems, so a compromised imaging system could serve as a pivot point for broader network intrusion.
Mitigation Recommendations
European healthcare organizations should prioritize patching affected DCMTK versions to 3.6.10 or later where the vulnerability is fixed. Since exploitation requires local access, organizations should enforce strict access controls and network segmentation to limit exposure of systems running DCMTK. Implementing robust endpoint security solutions and continuous monitoring can help detect suspicious activities indicative of exploitation attempts. Regular audits of user privileges and system access logs are recommended to identify and mitigate insider threats. Additionally, organizations should ensure that all medical imaging software and related dependencies are kept up to date and that secure coding and deployment practices are followed. Backup and recovery procedures should be tested to minimize impact in case of data corruption or system compromise. Finally, raising awareness among IT and security staff about this specific vulnerability will help in early detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Switzerland
CVE-2025-9732: Memory Corruption in DCMTK
Description
A vulnerability was identified in DCMTK up to 3.6.9. This affects an unknown function in the library dcmimage/include/dcmtk/dcmimage/diybrpxt.h of the component dcm2img. Such manipulation leads to memory corruption. Local access is required to approach this attack. The name of the patch is 7ad81d69b. It is best practice to apply a patch to resolve this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-9732 is a medium-severity memory corruption vulnerability identified in the DCMTK (DICOM Toolkit) library versions up to 3.6.9. The vulnerability resides in an unspecified function within the header file diybrpxt.h, part of the dcm2img component responsible for image processing in the DICOM standard. Exploitation of this vulnerability requires local access and low privileges, meaning an attacker must have some level of access to the affected system but does not require elevated privileges or user interaction. The vulnerability can lead to memory corruption, which may cause application crashes, data corruption, or potentially enable further exploitation such as arbitrary code execution depending on the context and memory layout. The CVSS 4.0 base score is 4.8, reflecting a medium severity with local attack vector, low complexity, no user interaction, and limited impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. A patch identified by commit 7ad81d69b has been released to address this issue, and applying this patch is recommended to mitigate the risk. DCMTK is widely used in medical imaging environments to handle DICOM files, which are standard in healthcare for storing and transmitting medical images. The vulnerability’s impact is therefore primarily relevant to healthcare organizations and any entities processing DICOM images using affected DCMTK versions.
Potential Impact
For European organizations, particularly those in the healthcare sector, this vulnerability poses a risk to the integrity and availability of medical imaging systems. Exploitation could disrupt diagnostic workflows by causing application crashes or corrupting image data, potentially delaying patient care or leading to misdiagnosis. Although the vulnerability requires local access, insider threats or compromised internal systems could leverage this flaw to escalate privileges or execute arbitrary code, further compromising sensitive patient data and system integrity. Given the critical role of medical imaging in healthcare delivery and the strict regulatory environment in Europe (e.g., GDPR, NIS Directive), any compromise or disruption could have significant operational, legal, and reputational consequences. Additionally, healthcare providers often operate interconnected systems, so a compromised imaging system could serve as a pivot point for broader network intrusion.
Mitigation Recommendations
European healthcare organizations should prioritize patching affected DCMTK versions to 3.6.10 or later where the vulnerability is fixed. Since exploitation requires local access, organizations should enforce strict access controls and network segmentation to limit exposure of systems running DCMTK. Implementing robust endpoint security solutions and continuous monitoring can help detect suspicious activities indicative of exploitation attempts. Regular audits of user privileges and system access logs are recommended to identify and mitigate insider threats. Additionally, organizations should ensure that all medical imaging software and related dependencies are kept up to date and that secure coding and deployment practices are followed. Backup and recovery procedures should be tested to minimize impact in case of data corruption or system compromise. Finally, raising awareness among IT and security staff about this specific vulnerability will help in early detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-30T14:03:15.522Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b45987ad5a09ad00bbef96
Added to database: 8/31/2025, 2:17:43 PM
Last enriched: 8/31/2025, 2:32:44 PM
Last updated: 9/1/2025, 6:24:10 AM
Views: 7
Related Threats
CVE-2025-36133: CWE-532 Insertion of Sensitive Information into Log File in IBM App Connect Enterprise Certified Container
MediumCVE-2025-9775: Unrestricted Upload in RemoteClinic
MediumCVE-2025-9774: Information Disclosure in RemoteClinic
MediumCVE-2025-9773: Cross Site Scripting in RemoteClinic
MediumCVE-2025-9772: Unrestricted Upload in RemoteClinic
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.