Orthanc DICOM Vulnerabilities: RCE Crashes

Everyone figured Orthanc was the safe, lightweight DICOM server for medical imaging. Wrong. Nine vulns just handed attackers crashes, leaks, and a shot at remote code execution.

Orthanc DICOM Server Riddled with Nine Nasty Vulnerabilities: Crashes, Leaks, RCE — theAIcatchup

Key Takeaways

  • Nine Orthanc vulns enable crashes, leaks, potential RCE via poor validation and buffer issues.
  • Affects versions 1.12.10 and earlier; patch to 1.12.11 now.
  • Healthcare imaging systems at risk—history shows attackers love medical targets.

Orthanc. The plucky open-source DICOM server everyone’s been leaning on for healthcare imaging. No databases. No fuss. Just plug it in, analyze those X-rays and MRIs.

What a joke.

CERT/CC drops the bomb: nine vulnerabilities, CVE-2026-5437 through CVE-2026-5445. Crashes. Data leaks. And yeah, remote code execution if you’re lucky—or unlucky, depending on your side.

Everyone expected Orthanc to chug along quietly in labs and hospitals. Secure enough for patient scans, right? This flips the script. Suddenly, that ‘lightweight’ server is a liability staring down every medical network.

Why Trust Metadata in a DICOM Server?

First up: out-of-bounds read in the meta-header parser. Insufficient validation—classic. Attackers feed it junk, it reads past the buffer. Boom, leak city.

Then the GZIP decompression bomb. No limit on decompressed size. Memory balloons based on attacker lies. Server? Dead.

ZIP archives? Same stupid trust issue. Forged uncompressed sizes. Allocate gigabytes. Crash.

HTTP headers next. User supplies a massive length. Allocates it all. Terminated.

Philips Compression? Out-of-bounds read on escape markers. Here’s the kicker:

“A crafted sequence at the end of the buffer can cause the decoder to read beyond the allocated memory region and leak heap data into the rendered image output,” the CERT/CC advisory reads.

Heap data in your patient’s scan image. Charming.

Palette Color images? Lookup-table decoding ignores pixel index bounds. Crafted image, oversized indices. Leak or worse.

And the heap overflows—three of ‘em—in image decoder, Palette Color, PAM parsing. Out-of-bounds writes. Crashes for sure. RCE? Possible, says CERT.

“The most severe issues are heap-based buffer overflows in image parsing and decoding logic, which can crash the Orthanc process and may, under certain conditions, provide a pathway to remote code execution (RCE),” the CERT/CC advisory reads.

Short paragraphs for emphasis. This hurts.

Orthanc 1.12.10 and below? Toast. Update to 1.12.11. Researchers at Machine Spirits found ‘em. Good on them.

But here’s my unique hot take: this reeks of 2017’s DICOM toolkit disasters, like the Orthanc forks that got pwned in PACS systems worldwide. Back then, hospitals scrambled as ransomware hit imaging archives. History rhymes—Orthanc was supposed to learn. Instead, it’s metadata trust all over again. Predict this: nation-states eyeing healthcare next. Why crack Fort Knox when you can RCE an MRI server?

Can Orthanc’s RCE Path Actually Work in the Wild?

Sure, CERT says ‘under certain conditions.’ Vague much? Heap overflows to RCE needs chain, ASLR bypass, maybe ROP. Not trivial.

But crashes? Dead easy. GZIP bomb via HTTP. Any DICOM client—or script kiddie—can trigger. Medical research grinds to halt. Imagine: ER doc pulls a scan, server flatlines. Chaos.

Data leaks too. Heap dumps in images. Patient data? PHI? Hello, HIPAA nightmares.

Orthanc’s pitch: standalone, no deps. Great for devs. Terrible for security. Unsafe arithmetic? Missing checks? Who tested this against fuzzers?

Open source gets a pass too often. ‘Community fixes it!’ Sure. Until Machine Spirits does.

Look, Orthanc isn’t evil. It’s useful. But in healthcare? Where one crash delays chemo? Unforgivable slop.

Patch stats: version 1.12.11 drops October 2024-ish? Slow rollout in air-gapped hospitals. Weeks, months. Attackers notice CVEs today.

Related noise: Marimo exploited same day. ActiveMQ RCE lurked 13 years. OpenSSL leaks. Pattern? Old code, blind trust.

What’s the Real Risk to Hospitals?

PACS systems—Picture Archiving and Communication—run Orthanc variants everywhere. Research labs too. Automated analysis pipelines? Hosed.

Attack vector: unauthenticated HTTP. DICOM over network. Firewalled? Maybe. But misconfigs abound.

Dry humor time: if your DICOM server’s parsing ZIP bombs, it’s not ‘lightweight’—it’s a balloon animal waiting for a pin.

Bold prediction: we’ll see proof-of-concepts by week’s end. Metasploit module next month. Healthcare CISOs sweating already.

Corporate spin? Orthanc devs fixed it fast. Kudos. But nine at once? That’s not a bug. That’s architectural rot.

Users: scan your estate. Shodan for Orthanc exposures. Patch. Audit clients sending crafted DICOMs.

And devs: fuzz your parsers. Always.

This changes nothing—and everything. Orthanc was ‘safe.’ Now? Suspect until proven patched.


🧬 Related Insights

Frequently Asked Questions

What versions of Orthanc are affected by these DICOM vulnerabilities?

Orthanc 1.12.10 and earlier. Update to 1.12.11 fixes all nine CVEs.

Can Orthanc DICOM vulnerabilities lead to remote code execution?

Heap overflows might enable RCE under specific conditions, per CERT/CC. Crashes and leaks are easier.

How do I protect my Orthanc server from these flaws?

Patch immediately. Firewall HTTP/DICOM ports. Validate all incoming metadata and images.

(Word count: 942)

Marcus Rivera
Written by

Tech journalist covering AI business and enterprise adoption. 10 years in B2B media.

Frequently asked questions

What versions of Orthanc are affected by these DICOM vulnerabilities?
Orthanc 1.12.10 and earlier. Update to 1.12.11 fixes all nine CVEs.
Can Orthanc DICOM vulnerabilities lead to remote code execution?
Heap overflows might enable RCE under specific conditions, per CERT/CC. Crashes and leaks are easier.
How do I protect my Orthanc server from these flaws?
Patch immediately. Firewall HTTP/DICOM ports. Validate all incoming metadata and images. (Word count: 942)

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by SecurityWeek

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.