CVE-2025-52582
📋 TL;DR
An out-of-bounds read vulnerability in Grassroot DICOM's Overlay::GrabOverlayFromPixelData function allows attackers to leak sensitive information by providing specially crafted DICOM files. This affects systems running Grassroot DICOM 3.024 that process untrusted DICOM files. The vulnerability enables information disclosure but not code execution.
💻 Affected Systems
- Grassroot DICOM
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Sensitive memory contents including credentials, keys, or other application data could be exfiltrated, potentially enabling further attacks.
Likely Case
Limited information disclosure from application memory, possibly revealing file contents or application state.
If Mitigated
No impact if proper input validation and memory protections are in place.
🎯 Exploit Status
Exploitation requires crafting a malicious DICOM file but no authentication is needed to trigger the vulnerability if file processing is accessible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2025-2211
Restart Required: No
Instructions:
1. Monitor Grassroot DICOM vendor for security updates. 2. Apply patches when available. 3. Test in non-production environment first.
🔧 Temporary Workarounds
Input Validation
allImplement strict validation of DICOM files before processing
Access Control
allRestrict who can submit DICOM files to vulnerable systems
🧯 If You Can't Patch
- Isolate vulnerable systems from untrusted networks
- Implement application allowlisting to prevent execution of malicious DICOM files
🔍 How to Verify
Check if Vulnerable:
Check Grassroot DICOM version; if version is 3.024, system is vulnerable.
Check Version:
Check application documentation for version query method (varies by installation)
Verify Fix Applied:
Verify Grassroot DICOM version is updated beyond 3.024 when patch becomes available.
📡 Detection & Monitoring
Log Indicators:
- Unusual DICOM file processing errors
- Memory access violation logs
- Large number of failed DICOM file processing attempts
Network Indicators:
- Unusual DICOM file uploads from unexpected sources
- Patterns of failed DICOM processing requests
SIEM Query:
source="dicom_server" AND (error="memory" OR error="access")