CVE-2021-21807

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Accusoft ImageGear's DICOM parser allows remote code execution via integer overflow leading to stack buffer overflow. Attackers can exploit it by tricking users into opening malicious DICOM files. Organizations using ImageGear for medical imaging or document processing are affected.

💻 Affected Systems

Products:
  • Accusoft ImageGear
Versions: 19.9 and earlier versions
Operating Systems: Windows, Linux, macOS (any platform running ImageGear)
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using ImageGear library to parse DICOM files is vulnerable. DICOM is commonly used in medical imaging systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution as the user running the vulnerable software, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Remote code execution on systems processing untrusted DICOM files, particularly in healthcare environments where medical imaging is common.

🟢

If Mitigated

Denial of service or application crash if exploit fails, but proper controls should prevent successful exploitation.

🌐 Internet-Facing: HIGH - Malicious files can be delivered via email, web downloads, or compromised websites to target users.
🏢 Internal Only: MEDIUM - Risk exists if users process untrusted DICOM files from internal sources, but attack surface is smaller than internet-facing.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available. Exploitation requires user interaction to open malicious file but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ImageGear 19.10 or later

Vendor Advisory: https://www.accusoft.com/products/imagegear-collection/imagegear/

Restart Required: Yes

Instructions:

1. Download ImageGear 19.10 or later from Accusoft. 2. Uninstall current ImageGear version. 3. Install updated version. 4. Restart affected systems. 5. Recompile applications using the updated library.

🔧 Temporary Workarounds

File type restriction

all

Block DICOM files at network perimeter and email gateways

Application sandboxing

all

Run ImageGear applications in restricted environments with limited privileges

🧯 If You Can't Patch

  • Implement strict file validation: reject malformed DICOM files before processing
  • Deploy application control to prevent execution of untrusted ImageGear applications

🔍 How to Verify

Check if Vulnerable:

Check ImageGear version: if version is 19.9 or earlier, system is vulnerable. Applications using ImageGear DLLs should be inventoried.

Check Version:

On Windows: check DLL properties or registry entries. On Linux: check shared library versions. Application-specific methods vary.

Verify Fix Applied:

Verify ImageGear version is 19.10 or later. Test with known safe DICOM files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes from ImageGear processes
  • Unusual file processing of DICOM files
  • Memory access violations in application logs

Network Indicators:

  • Unexpected DICOM file transfers to vulnerable systems
  • Malicious file delivery via email or web

SIEM Query:

ImageGear process crashes OR DICOM file processing anomalies OR memory violation events from ImageGear applications

🔗 References

📤 Share & Export