CVE-2025-5943

8.8 HIGH

📋 TL;DR

MicroDicom DICOM Viewer has an out-of-bounds write vulnerability that could allow remote attackers to execute arbitrary code. Users are affected if they visit malicious websites or open malicious DICOM files. This vulnerability requires user interaction to exploit.

💻 Affected Systems

Products:
  • MicroDicom DICOM Viewer
Versions: Specific versions not specified in advisory - assume all versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects the DICOM file parsing functionality. Any system running MicroDicom DICOM Viewer that processes DICOM files is potentially vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, or system disruption for individual users who open malicious DICOM files.

🟢

If Mitigated

Limited impact with proper application sandboxing, network segmentation, and user awareness preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file or visiting malicious website). The vulnerability is in file parsing logic which could be exploited through specially crafted DICOM files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-160-01

Restart Required: Yes

Instructions:

1. Visit the CISA advisory link for latest information
2. Download and install the latest version of MicroDicom DICOM Viewer from official vendor sources
3. Restart the application and any related services
4. Verify the update was successful

🔧 Temporary Workarounds

Disable DICOM file association

windows

Prevent DICOM files from automatically opening in MicroDicom Viewer

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .dcm association to another application

Application sandboxing

windows

Run MicroDicom Viewer in a restricted environment

Use Windows Sandbox or virtualization to isolate the application

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running MicroDicom Viewer
  • Deploy application whitelisting to prevent execution of unauthorized code
  • Enforce user awareness training about opening untrusted DICOM files
  • Deploy endpoint detection and response (EDR) solutions to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check MicroDicom Viewer version against vendor's patched version list. If version is older than patched version, system is vulnerable.

Check Version:

Open MicroDicom Viewer > Help > About to view version information

Verify Fix Applied:

Verify MicroDicom Viewer has been updated to the latest version from official sources and test DICOM file processing functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in MicroDicom Viewer logs
  • Unusual process creation from MicroDicom Viewer executable
  • Failed file parsing attempts in application logs

Network Indicators:

  • Outbound connections from MicroDicom Viewer to unknown external IPs
  • Unusual network traffic patterns following DICOM file processing

SIEM Query:

Process Creation where ParentImage contains 'MicroDicom' AND (CommandLine contains '.dcm' OR CommandLine contains malicious indicators)

🔗 References

📤 Share & Export