MicroDicom’s DICOM Viewer Vulnerabilities: A Comedy of Errors with Out-of-Bounds Exploits!

View CSAF: MicroDicom’s DICOM Viewer might just be the ultimate party crasher in your system with vulnerabilities like out-of-bounds write and read. While it won’t bring chips and dip, it could allow attackers to execute arbitrary code and cause memory corruption. Update now to avoid any uninvited guests!

Pro Dashboard

Hot Take:

Looks like hackers are trying to play doctor with the MicroDicom DICOM Viewer. But instead of just viewing X-rays, they’re hoping to break a few bones in your cybersecurity defenses! Time to patch up those vulnerabilities before your data ends up in a full-body cast.

Key Points:

– MicroDicom’s DICOM Viewer is plagued by vulnerabilities that can lead to memory corruption and arbitrary code execution.
– The vulnerabilities have been assigned CVE-2025-35975 and CVE-2025-36521, both with a CVSS v4 score of 8.6.
– Exploitation requires opening a malicious DCM file, a classic case of “don’t open that email attachment!”
– The healthcare sector is the main target, with deployments worldwide.
– Mitigation involves updating to version 2025.2 and following CISA’s defensive recommendations.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?