CVE-2023-32131

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Sante DICOM Viewer Pro. Attackers can exploit this by tricking users into opening malicious DCM image files, leading to potential system compromise. Healthcare organizations and medical imaging users are primarily affected.

💻 Affected Systems

Products:
  • Sante DICOM Viewer Pro
Versions: Versions prior to the patched release (specific version not specified in available references)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open malicious DCM files. Medical imaging workstations in healthcare environments are primary targets.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining the same privileges as the user running the DICOM viewer, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation on the affected workstation, compromising patient data and disrupting medical imaging workflows.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

User interaction required (opening malicious file). The vulnerability is an out-of-bounds write which typically allows reliable exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references - check vendor advisory

Vendor Advisory: https://www.santesoft.com/ (check for security updates)

Restart Required: Yes

Instructions:

1. Visit SanteSoft website or contact vendor for latest security updates
2. Download and install the patched version of Sante DICOM Viewer Pro
3. Restart the application and system if required
4. Verify the update was successful

🔧 Temporary Workarounds

Restrict DCM file handling

windows

Configure system to open DCM files with alternative, secure viewers or restrict execution of Sante DICOM Viewer Pro

Use Windows Group Policy to modify file associations for .dcm files
Implement application control policies to restrict Sante DICOM Viewer execution

User awareness and training

all

Train users to only open DCM files from trusted sources and verify file integrity

🧯 If You Can't Patch

  • Implement application sandboxing or virtualization for the DICOM viewer
  • Run the application with minimal user privileges and enable DEP/ASLR protections

🔍 How to Verify

Check if Vulnerable:

Check Sante DICOM Viewer Pro version against vendor's patched version list. If running an older version, assume vulnerable.

Check Version:

Open Sante DICOM Viewer Pro → Help → About (or check program properties in Windows)

Verify Fix Applied:

Verify installed version matches or exceeds the patched version specified by vendor. Test with known safe DCM files to ensure application stability.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from Sante DICOM Viewer
  • Unusual network connections from the viewer process

Network Indicators:

  • Downloads of DCM files from untrusted sources
  • Outbound connections to suspicious IPs following DCM file opening

SIEM Query:

Process Creation where (Image contains 'Sante' OR ParentImage contains 'Sante') AND CommandLine contains '.dcm'

🔗 References

📤 Share & Export