MicroDicom’s DICOM Viewer Vulnerabilities: A Comedy of Errors with Out-of-Bounds Exploits!
View CSAF: MicroDicom’s DICOM Viewer might just be the ultimate party crasher in your system with vulnerabilities like out-of-bounds write and read. While it won’t bring chips and dip, it could allow attackers to execute arbitrary code and cause memory corruption. Update now to avoid any uninvited guests!

Hot Take:
Looks like hackers are trying to play doctor with the MicroDicom DICOM Viewer. But instead of just viewing X-rays, they’re hoping to break a few bones in your cybersecurity defenses! Time to patch up those vulnerabilities before your data ends up in a full-body cast.
Key Points:
– MicroDicom’s DICOM Viewer is plagued by vulnerabilities that can lead to memory corruption and arbitrary code execution.
– The vulnerabilities have been assigned CVE-2025-35975 and CVE-2025-36521, both with a CVSS v4 score of 8.6.
– Exploitation requires opening a malicious DCM file, a classic case of “don’t open that email attachment!”
– The healthcare sector is the main target, with deployments worldwide.
– Mitigation involves updating to version 2025.2 and following CISA’s defensive recommendations.