CVE-2023-34297

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Sante DICOM Viewer Pro by tricking users into opening malicious JP2 image files. The flaw exists in how the software parses JP2 files without proper bounds checking, enabling out-of-bounds writes that can lead to remote code execution. Users of Sante DICOM Viewer Pro are affected when they open untrusted JP2 files.

💻 Affected Systems

Products:
  • Sante DICOM Viewer Pro
Versions: Versions prior to the patched version (specific version not specified in provided references)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction - opening a malicious JP2 file. Medical environments using this software for viewing DICOM images are particularly at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes arbitrary code with the privileges of the current user, potentially installing malware, stealing sensitive medical data, or using the system as a foothold for further attacks.

🟢

If Mitigated

If proper controls like application sandboxing and least privilege are implemented, impact is limited to the application context with minimal system-wide damage.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) but no authentication. The vulnerability is in a file parser, making exploitation more complex than simple buffer overflows.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references - check vendor advisory

Vendor Advisory: Not provided in references

Restart Required: Yes

Instructions:

1. Check Sante DICOM Viewer Pro vendor website for security advisory
2. Download and install the latest patched version
3. Restart the application and any related services
4. Verify the patch is applied correctly

🔧 Temporary Workarounds

Disable JP2 file association

windows

Remove JP2 file type association with Sante DICOM Viewer Pro to prevent automatic opening

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .jp2 association to another program or none

Application sandboxing

windows

Run Sante DICOM Viewer Pro in a sandboxed environment to limit potential damage

🧯 If You Can't Patch

  • Implement strict file validation policies to block JP2 files from untrusted sources
  • Run the application with minimal user privileges and in isolated environments

🔍 How to Verify

Check if Vulnerable:

Check Sante DICOM Viewer Pro version against vendor's patched version list

Check Version:

Within Sante DICOM Viewer Pro: Help > About or check program properties

Verify Fix Applied:

Verify application version matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening JP2 files
  • Unexpected process creation from Sante DICOM Viewer Pro
  • Network connections from the application to suspicious IPs

Network Indicators:

  • Outbound connections from Sante DICOM Viewer Pro to unknown destinations
  • Unusual network traffic patterns following JP2 file access

SIEM Query:

Process creation where parent process contains 'Sante DICOM Viewer' AND (command line contains '.jp2' OR file path contains '.jp2')

🔗 References

📤 Share & Export