CVE-2025-14841

3.3 LOW

📋 TL;DR

A null pointer dereference vulnerability exists in OFFIS DCMTK's DICOM Query/Retrieve Service Class Provider (dcmqrscp) component. This flaw allows local attackers to cause denial of service by crashing the service. Only systems running DCMTK's dcmqrscp service with affected versions are impacted.

💻 Affected Systems

Products:
  • OFFIS DCMTK
Versions: Up to and including 3.6.9
Operating Systems: All platforms running DCMTK
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the dcmqrscp component for DICOM query/retrieve operations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for the DICOM query/retrieve service, disrupting medical imaging workflows and potentially affecting patient care continuity.

🟠

Likely Case

Service crash requiring manual restart, causing temporary disruption to DICOM query/retrieve operations.

🟢

If Mitigated

Minimal impact with proper access controls preventing local unauthorized access to the service.

🌐 Internet-Facing: LOW - Attack requires local access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers with access to the service could disrupt medical imaging operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to trigger the vulnerable functions via DICOM query/retrieve operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.7.0

Vendor Advisory: https://support.dcmtk.org/redmine/issues/1183

Restart Required: Yes

Instructions:

1. Download DCMTK 3.7.0 from official repository. 2. Compile and install following DCMTK documentation. 3. Restart dcmqrscp service. 4. Verify version with dcmqrscp --version

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local system access to only authorized users and processes

Service Monitoring and Auto-restart

all

Implement monitoring to detect and automatically restart crashed dcmqrscp service

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local users from accessing the dcmqrscp service
  • Deploy monitoring with alerting for service crashes and implement manual restart procedures

🔍 How to Verify

Check if Vulnerable:

Check DCMTK version: dcmqrscp --version | grep -i version. If version is 3.6.9 or earlier, system is vulnerable.

Check Version:

dcmqrscp --version

Verify Fix Applied:

After upgrade, verify version is 3.7.0 or later with: dcmqrscp --version

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault or crash logs from dcmqrscp process
  • Unexpected service termination in system logs

Network Indicators:

  • Sudden drop in DICOM query/retrieve service availability

SIEM Query:

process_name:"dcmqrscp" AND (event_type:"crash" OR exit_code:139)

🔗 References

📤 Share & Export