Orthanc DICOM Vulnerabilities Lead to Crashes, RCE

Orthanc DICOM Vulnerabilities Lead to Crashes, RCE

SecurityWeek
SecurityWeekApr 10, 2026

Companies Mentioned

Why It Matters

Unpatched Orthanc servers expose hospitals and research labs to service outages, patient‑data breaches, and potential ransomware via remote code execution, threatening both clinical operations and regulatory compliance.

Key Takeaways

  • Nine Orthanc DICOM bugs enable crashes, data leaks, remote code execution
  • Vulnerabilities stem from unchecked metadata, unsafe arithmetic, and decompression bombs
  • Affected versions up to 1.12.10; update to 1.12.11 to patch all flaws
  • Healthcare providers risk patient data exposure and service downtime without remediation

Pulse Analysis

Orthanc has become a cornerstone for lightweight medical imaging workflows, offering hospitals a plug‑and‑play DICOM server without the overhead of traditional PACS solutions. The recent discovery of nine distinct vulnerabilities underscores how even well‑maintained open‑source projects can harbor critical flaws when input validation is insufficient. By exploiting unchecked metadata, malformed compression streams, and unchecked header lengths, attackers can trigger memory corruption that leads to denial‑of‑service or, in worst‑case scenarios, remote code execution that compromises the entire imaging infrastructure.

From a technical perspective, the advisory details a mix of out‑of‑bounds reads, decompression‑bomb attacks, and heap buffer overflows across Orthanc’s HTTP handling, ZIP and GZIP processing, and proprietary Philips compression decoding. These bugs are not merely academic; they allow malicious actors to craft crafted DICOM files or HTTP requests that exhaust system memory or execute arbitrary code on the host. In a healthcare setting, such an intrusion could corrupt diagnostic images, leak protected health information, or provide a foothold for ransomware that halts critical radiology services, directly impacting patient care and compliance with HIPAA regulations.

The swift release of Orthanc 1.12.11 demonstrates responsible disclosure and the importance of rapid patch cycles for medical software. Organizations running Orthanc should prioritize the upgrade, audit network exposure, and enforce strict input sanitization at the perimeter. This incident also highlights broader supply‑chain concerns: reliance on open‑source components demands continuous vulnerability monitoring and robust incident‑response plans. By staying current with patches and integrating security testing into the imaging pipeline, healthcare providers can safeguard both operational continuity and patient privacy.

Orthanc DICOM Vulnerabilities Lead to Crashes, RCE

Comments

Want to join the conversation?

Loading comments...