CVE-2026-3650: CWE-401 in Grassroots Grassroots DICOM (GDCM)
CVE-2026-3650 is a high-severity memory leak vulnerability in the Grassroots DICOM library (GDCM) version 3. 2. 2. It arises when parsing malformed DICOM files containing non-standard VR types in the file meta information, causing excessive memory allocation and resource exhaustion. This can lead to denial-of-service (DoS) conditions without requiring authentication or user interaction. The vulnerability allows a single crafted file to fill the heap rapidly, impacting availability of systems processing DICOM images. No known exploits are currently reported in the wild. Organizations relying on GDCM for medical imaging workflows should prioritize patching or mitigating this issue to prevent service disruption. Countries with advanced healthcare infrastructure and widespread use of DICOM standards are most at risk. The CVSS 4.
AI Analysis
Technical Summary
CVE-2026-3650 identifies a memory leak vulnerability classified under CWE-401 in the Grassroots DICOM library (GDCM) version 3.2.2. The flaw occurs during the parsing of malformed DICOM files that include non-standard Value Representation (VR) types within the file meta information header. When such a file is processed, the library allocates large amounts of memory on the heap without properly releasing it, leading to a resource exhaustion condition. This uncontrolled memory consumption can cause the affected application or system to become unresponsive or crash, resulting in a denial-of-service (DoS) scenario. The vulnerability is exploitable remotely over the network without requiring any authentication or user interaction, making it highly accessible to attackers. Although no public exploits have been reported yet, the nature of the vulnerability and the critical role of GDCM in medical imaging workflows make it a significant risk. The CVSS 4.0 base score of 8.7 reflects the ease of exploitation and the high impact on system availability. This vulnerability primarily affects healthcare environments where GDCM is used to process DICOM files, which are standard in medical imaging for storing and transmitting information such as X-rays, MRIs, and CT scans. The lack of patch availability at the time of publication necessitates immediate mitigation efforts to prevent potential service disruptions.
Potential Impact
The primary impact of CVE-2026-3650 is on the availability of systems that utilize the Grassroots DICOM library for medical image processing. Exploitation can cause significant memory exhaustion leading to application crashes or system unresponsiveness, effectively resulting in denial-of-service conditions. This can disrupt critical healthcare operations, delaying diagnosis and treatment. Since DICOM is widely used in hospitals, clinics, and diagnostic centers globally, the vulnerability poses a risk to patient care continuity. Additionally, resource depletion attacks can increase operational costs due to system downtime and recovery efforts. Although confidentiality and integrity are not directly affected, the disruption of availability in healthcare environments can have severe indirect consequences. The vulnerability’s network-exploitable nature without authentication broadens the attack surface, allowing remote attackers to trigger the condition by sending malicious DICOM files. This could also impact third-party services and cloud platforms offering medical imaging processing if they incorporate the vulnerable GDCM version.
Mitigation Recommendations
1. Immediate mitigation involves implementing input validation and filtering at the network or application layer to block malformed or suspicious DICOM files containing non-standard VR types before they reach the vulnerable GDCM parser. 2. Employ sandboxing or containerization for applications processing DICOM files to isolate potential crashes and prevent system-wide impact. 3. Monitor memory usage patterns of applications using GDCM to detect abnormal spikes indicative of exploitation attempts. 4. Restrict network access to systems processing DICOM files to trusted sources only, reducing exposure to remote attacks. 5. Engage with the Grassroots project or vendor for updates or patches addressing this vulnerability; apply patches promptly once available. 6. Consider deploying runtime application self-protection (RASP) or memory protection tools that can detect and mitigate memory leaks or excessive allocations dynamically. 7. Conduct regular security assessments and fuzz testing on DICOM processing pipelines to identify and remediate similar vulnerabilities proactively. 8. Maintain robust incident response plans tailored to healthcare environments to minimize downtime in case of exploitation.
Affected Countries
United States, Germany, Japan, United Kingdom, France, Canada, Australia, South Korea, Netherlands, Switzerland, Sweden
CVE-2026-3650: CWE-401 in Grassroots Grassroots DICOM (GDCM)
Description
CVE-2026-3650 is a high-severity memory leak vulnerability in the Grassroots DICOM library (GDCM) version 3. 2. 2. It arises when parsing malformed DICOM files containing non-standard VR types in the file meta information, causing excessive memory allocation and resource exhaustion. This can lead to denial-of-service (DoS) conditions without requiring authentication or user interaction. The vulnerability allows a single crafted file to fill the heap rapidly, impacting availability of systems processing DICOM images. No known exploits are currently reported in the wild. Organizations relying on GDCM for medical imaging workflows should prioritize patching or mitigating this issue to prevent service disruption. Countries with advanced healthcare infrastructure and widespread use of DICOM standards are most at risk. The CVSS 4.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3650 identifies a memory leak vulnerability classified under CWE-401 in the Grassroots DICOM library (GDCM) version 3.2.2. The flaw occurs during the parsing of malformed DICOM files that include non-standard Value Representation (VR) types within the file meta information header. When such a file is processed, the library allocates large amounts of memory on the heap without properly releasing it, leading to a resource exhaustion condition. This uncontrolled memory consumption can cause the affected application or system to become unresponsive or crash, resulting in a denial-of-service (DoS) scenario. The vulnerability is exploitable remotely over the network without requiring any authentication or user interaction, making it highly accessible to attackers. Although no public exploits have been reported yet, the nature of the vulnerability and the critical role of GDCM in medical imaging workflows make it a significant risk. The CVSS 4.0 base score of 8.7 reflects the ease of exploitation and the high impact on system availability. This vulnerability primarily affects healthcare environments where GDCM is used to process DICOM files, which are standard in medical imaging for storing and transmitting information such as X-rays, MRIs, and CT scans. The lack of patch availability at the time of publication necessitates immediate mitigation efforts to prevent potential service disruptions.
Potential Impact
The primary impact of CVE-2026-3650 is on the availability of systems that utilize the Grassroots DICOM library for medical image processing. Exploitation can cause significant memory exhaustion leading to application crashes or system unresponsiveness, effectively resulting in denial-of-service conditions. This can disrupt critical healthcare operations, delaying diagnosis and treatment. Since DICOM is widely used in hospitals, clinics, and diagnostic centers globally, the vulnerability poses a risk to patient care continuity. Additionally, resource depletion attacks can increase operational costs due to system downtime and recovery efforts. Although confidentiality and integrity are not directly affected, the disruption of availability in healthcare environments can have severe indirect consequences. The vulnerability’s network-exploitable nature without authentication broadens the attack surface, allowing remote attackers to trigger the condition by sending malicious DICOM files. This could also impact third-party services and cloud platforms offering medical imaging processing if they incorporate the vulnerable GDCM version.
Mitigation Recommendations
1. Immediate mitigation involves implementing input validation and filtering at the network or application layer to block malformed or suspicious DICOM files containing non-standard VR types before they reach the vulnerable GDCM parser. 2. Employ sandboxing or containerization for applications processing DICOM files to isolate potential crashes and prevent system-wide impact. 3. Monitor memory usage patterns of applications using GDCM to detect abnormal spikes indicative of exploitation attempts. 4. Restrict network access to systems processing DICOM files to trusted sources only, reducing exposure to remote attacks. 5. Engage with the Grassroots project or vendor for updates or patches addressing this vulnerability; apply patches promptly once available. 6. Consider deploying runtime application self-protection (RASP) or memory protection tools that can detect and mitigate memory leaks or excessive allocations dynamically. 7. Conduct regular security assessments and fuzz testing on DICOM processing pipelines to identify and remediate similar vulnerabilities proactively. 8. Maintain robust incident response plans tailored to healthcare environments to minimize downtime in case of exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-03-06T16:24:00.662Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c5a54b3c064ed76fcfc836
Added to database: 3/26/2026, 9:29:47 PM
Last enriched: 3/26/2026, 9:44:48 PM
Last updated: 3/27/2026, 5:27:38 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.