CVE-2023-32131
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Sante DICOM Viewer Pro. Attackers can exploit this by tricking users into opening malicious DCM image files, leading to potential system compromise. Healthcare organizations and medical imaging users are primarily affected.
💻 Affected Systems
- Sante DICOM Viewer Pro
📦 What is this software?
Dicom Editor by Santesoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with attacker gaining the same privileges as the user running the DICOM viewer, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local privilege escalation or malware installation on the affected workstation, compromising patient data and disrupting medical imaging workflows.
If Mitigated
Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than code execution.
🎯 Exploit Status
User interaction required (opening malicious file). The vulnerability is an out-of-bounds write which typically allows reliable exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references - check vendor advisory
Vendor Advisory: https://www.santesoft.com/ (check for security updates)
Restart Required: Yes
Instructions:
1. Visit SanteSoft website or contact vendor for latest security updates
2. Download and install the patched version of Sante DICOM Viewer Pro
3. Restart the application and system if required
4. Verify the update was successful
🔧 Temporary Workarounds
Restrict DCM file handling
windowsConfigure system to open DCM files with alternative, secure viewers or restrict execution of Sante DICOM Viewer Pro
Use Windows Group Policy to modify file associations for .dcm files
Implement application control policies to restrict Sante DICOM Viewer execution
User awareness and training
allTrain users to only open DCM files from trusted sources and verify file integrity
🧯 If You Can't Patch
- Implement application sandboxing or virtualization for the DICOM viewer
- Run the application with minimal user privileges and enable DEP/ASLR protections
🔍 How to Verify
Check if Vulnerable:
Check Sante DICOM Viewer Pro version against vendor's patched version list. If running an older version, assume vulnerable.
Check Version:
Open Sante DICOM Viewer Pro → Help → About (or check program properties in Windows)
Verify Fix Applied:
Verify installed version matches or exceeds the patched version specified by vendor. Test with known safe DCM files to ensure application stability.
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unexpected child processes spawned from Sante DICOM Viewer
- Unusual network connections from the viewer process
Network Indicators:
- Downloads of DCM files from untrusted sources
- Outbound connections to suspicious IPs following DCM file opening
SIEM Query:
Process Creation where (Image contains 'Sante' OR ParentImage contains 'Sante') AND CommandLine contains '.dcm'