CVE-2025-53619

7.4 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Grassroot DICOM's JPEGBITSCodec::InternalCode function allows attackers to leak sensitive information by providing specially crafted DICOM files. This affects systems using Grassroot DICOM 3.024 for medical imaging processing. The vulnerability can be exploited without authentication to read memory contents.

💻 Affected Systems

Products:
  • Grassroot DICOM
Versions: 3.024
Operating Systems: All platforms running Grassroot DICOM
Default Config Vulnerable: ⚠️ Yes
Notes: Any system processing DICOM files with the vulnerable library is affected, including PACS systems, medical viewers, and research tools.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive patient data, system memory contents, or authentication credentials could be exfiltrated from medical imaging systems, potentially violating HIPAA/medical privacy regulations.

🟠

Likely Case

Information disclosure of medical image metadata, partial memory contents, or system information that could aid further attacks.

🟢

If Mitigated

Limited information leakage with proper input validation and memory protection controls in place.

🌐 Internet-Facing: MEDIUM - Requires file upload capability; medical imaging systems often have limited internet exposure.
🏢 Internal Only: HIGH - Internal medical imaging systems frequently process untrusted DICOM files from various sources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious DICOM file but doesn't require authentication if file processing is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2025-2210

Restart Required: No

Instructions:

1. Monitor Grassroot DICOM vendor for security updates. 2. Check if newer versions address CWE-119 issues. 3. Apply patches when available from official sources.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict validation of DICOM files before processing with Grassroot DICOM library

Memory Protection

all

Enable ASLR and DEP/Control Flow Guard on systems using the vulnerable library

# Windows: Enable DEP via System Properties > Advanced > Performance Settings
# Linux: Check ASLR status: sysctl kernel.randomize_va_space

🧯 If You Can't Patch

  • Isolate systems using Grassroot DICOM from untrusted networks and limit file upload sources
  • Implement application-level firewalls to monitor and block suspicious DICOM file processing patterns

🔍 How to Verify

Check if Vulnerable:

Check if Grassroot DICOM version 3.024 is installed and used for DICOM file processing

Check Version:

# Check library version in application dependencies or package manager

Verify Fix Applied:

Verify updated version is installed and test with known safe DICOM files

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed DICOM file parsing attempts
  • Unusual memory access patterns in application logs
  • Large out-of-bounds read errors

Network Indicators:

  • Unusual DICOM file uploads to medical imaging systems
  • Multiple failed C-STORE requests with malformed files

SIEM Query:

source="application_logs" AND ("out of bounds" OR "segmentation fault" OR "access violation") AND process="*dicom*"

🔗 References

📤 Share & Export