CVE-2024-42845

8.0 HIGH

📋 TL;DR

This CVE describes an eval injection vulnerability in InVesalius's DICOM file reader that allows attackers to execute arbitrary code by loading a malicious DICOM file. Users of InVesalius 3.1.99991 through 3.1.99998 who process untrusted DICOM files are affected. The vulnerability stems from improper input validation in the dicom.py component.

💻 Affected Systems

Products:
  • InVesalius
Versions: 3.1.99991 through 3.1.99998
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable when processing DICOM files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when processing malicious DICOM files from untrusted sources.

🟢

If Mitigated

Limited impact if only trusted DICOM files are processed and proper file validation is implemented.

🌐 Internet-Facing: LOW (InVesalius is typically used locally for medical imaging, not as an internet-facing service)
🏢 Internal Only: MEDIUM (Risk exists when processing DICOM files from untrusted internal sources or compromised systems)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction to load a malicious DICOM file. Proof-of-concept code is available in the referenced GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.99999 or later

Vendor Advisory: https://github.com/invesalius/invesalius3/releases

Restart Required: No

Instructions:

1. Download the latest version from GitHub releases. 2. Install the updated version. 3. Verify the installation by checking the version number.

🔧 Temporary Workarounds

Restrict DICOM file sources

all

Only process DICOM files from trusted sources and avoid loading files from unknown origins.

Use file integrity monitoring

all

Monitor for unexpected modifications to InVesalius files or suspicious process creation.

🧯 If You Can't Patch

  • Discontinue use of InVesalius for processing DICOM files from untrusted sources
  • Implement application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check InVesalius version number in the application or via the About dialog. Versions 3.1.99991 through 3.1.99998 are vulnerable.

Check Version:

Check the About section in InVesalius GUI or examine the application metadata

Verify Fix Applied:

Verify the version is 3.1.99999 or later after updating.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from InVesalius
  • Failed DICOM file loading attempts
  • Error messages related to eval execution

Network Indicators:

  • Unusual outbound connections from InVesalius process

SIEM Query:

Process creation where parent process contains 'invesalius' AND command line contains suspicious patterns like 'eval', 'exec', or 'system'

🔗 References

📤 Share & Export