JustAppSec
Back to news

Orthanc fixes DICOM parsing flaws enabling DoS and potential RCE

2 min readPublished 10 Apr 2026Source: SecurityWeek

TL;DR — Nine Orthanc DICOM Server flaws let attackers crash the server, leak heap data, and potentially reach remote code execution via crafted DICOM images or HTTP requests.

What happened

Orthanc is an open-source DICOM server used to store, process, and retrieve medical imaging data, typically exposing an HTTP interface for uploads, retrieval, and automation.

SecurityWeek reports that CERT/CC coordinated disclosure for nine vulnerabilities in Orthanc, tracked as CVE-2026-5437 through CVE-2026-5445, impacting Orthanc 1.12.10 and earlier. The issues span out-of-bounds reads, resource exhaustion, and heap buffer overflows across DICOM parsing, image decoding, and HTTP request handling.

CVEBug class (as described by CERT/CC)Attack surface example
CVE-2026-5437Out-of-bounds read in DICOM meta-header parsing (DicomStreamReader)Crafted DICOM metadata
CVE-2026-5438Gzip decompression bomb (no decompressed-size limit)HTTP request with Content-Encoding: gzip
CVE-2026-5439ZIP metadata trust → memory exhaustion during extractionZIP uploads to affected endpoints
CVE-2026-5440Unbounded Content-Length → excessive allocation / terminationHTTP request with huge Content-Length
CVE-2026-5441Out-of-bounds read in Philips compression decodeCrafted compressed image data
CVE-2026-5442Heap buffer overflow via integer overflow in frame-size calc (UL vs US dimensions)Crafted DICOM dimensions
CVE-2026-5443Heap buffer overflow in PALETTE COLOR decoding (32-bit overflow)Crafted palette color images
CVE-2026-5444Heap buffer overflow in PAM image parsing (32-bit overflow)Crafted PAM-in-DICOM content
CVE-2026-5445Out-of-bounds read in lookup-table decode (palette index not validated)Crafted pixel indices

CERT/CC’s impact statement (as relayed by SecurityWeek) highlights that the most severe issues are heap-based buffer overflows in image parsing/decoding that can crash Orthanc and may, under certain conditions, provide a pathway to RCE.

This is the class of bug that tends to become operationally urgent when the service is reachable from less-trusted networks (or ingesting untrusted studies): “just parsing images” becomes an attacker-controlled memory-safety boundary, and DICOM pipelines often have broad lateral reach into clinical systems.

Who is impacted

  • Any deployment running Orthanc 1.12.10 or earlier.
  • Higher-risk environments where Orthanc’s HTTP endpoints are reachable by untrusted clients or where Orthanc ingests medical imaging data from outside a tightly controlled acquisition network.
  • Deployments that accept uploads or automate ingestion (increasing exposure to crafted DICOM content, compressed payloads, and large/malicious HTTP requests).

What to do now

  • Follow vendor remediation guidance and apply the patched Orthanc release referenced by CERT/CC.
    • CERT/CC’s solution section states Orthanc released 1.12.11 to address the vulnerabilities.
    • Vendor statements included in the CERT/CC note repeat:

      "users are strongly advised to upgrade to, at least, Orthanc 1.12.11, where this vulnerability has been addressed."

  • Reduce exposure while patching rolls out:
    • Limit network reachability of Orthanc’s HTTP interface to trusted users and networks (especially any upload-capable endpoints).
    • Review deployment configurations to minimize who/what can submit DICOM content for decoding.
  • If compromise or abuse is suspected (e.g., unexplained crashes, memory spikes):
    • Preserve crash dumps/logs, and review recent uploads/requests that triggered decoders or compressed request handling paths.
    • Treat affected instances as potentially data-exposed (CERT/CC describes scenarios that can leak heap-resident data into rendered output).

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.