CVE-2025-0568

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to cause denial-of-service on Sante PACS Server by sending specially crafted DCM files. Authentication is not required, making any internet-facing installation vulnerable. The flaw exists in how the server parses DCM files, leading to memory corruption.

💻 Affected Systems

Products:
  • Sante PACS Server
Versions: Specific affected versions not specified in advisory - check vendor documentation
Operating Systems: Windows (presumed based on typical PACS deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations processing DCM files are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring manual restart, potentially disrupting medical imaging workflows and patient care.

🟠

Likely Case

Service disruption affecting DCM file processing capabilities, requiring server restart to restore functionality.

🟢

If Mitigated

Minimal impact if server is behind proper network segmentation and DCM file uploads are restricted.

🌐 Internet-Facing: HIGH - No authentication required and remote exploitation possible makes internet-facing instances highly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious DCM files but no authentication needed. ZDI has details but no public exploit available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.santesoft.com/security-advisories/ (check for specific advisory)

Restart Required: Yes

Instructions:

1. Check vendor advisory for patched version
2. Backup server configuration and data
3. Apply vendor-provided patch/update
4. Restart Sante PACS Server service
5. Verify functionality

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Sante PACS Server to trusted networks only

Configure firewall rules to allow only trusted IPs/subnets to access PACS server ports

File Upload Restrictions

all

Implement DCM file validation before processing

Implement proxy or WAF with file validation rules for DCM files

🧯 If You Can't Patch

  • Isolate Sante PACS Server in separate network segment with strict access controls
  • Implement application-level firewall or WAF with DCM file inspection capabilities

🔍 How to Verify

Check if Vulnerable:

Check Sante PACS Server version against vendor advisory. If unpatched and processing DCM files, assume vulnerable.

Check Version:

Check Sante PACS Server administration interface or installation directory for version information

Verify Fix Applied:

Verify patch installation via version check and test DCM file processing functionality

📡 Detection & Monitoring

Log Indicators:

  • Unexpected server crashes or restarts
  • Failed DCM file processing attempts
  • Memory-related errors in application logs

Network Indicators:

  • Multiple DCM file upload attempts from single source
  • Unusual traffic patterns to PACS server DCM endpoints

SIEM Query:

source="sante-pacs" AND (event_type="crash" OR error_message="memory" OR "corruption")

🔗 References

📤 Share & Export