An issue was discovered in the DICOM Part 10 File Format in the NEMA DICOM Standard 1995 through 2019b and continuing in current implementations. The 128-byte preamble of a DICOM file that complies with this specification can contain arbitrary executable headers for multiple operating systems, including Portable Executable (PE) files for Windows and Executable and Linkable Format (ELF) files for Linux-based systems. This space is left unspecified so that dual-purpose files can be created. For example, dual-purpose TIFF/DICOM files are used in digital whole slide imaging applications in medicine. This design flaw enables system-wide compromise as malicious DICOM files are routinely shared between medical devices and hospital systems and transported via removable media for patient care coordination. To exploit this vulnerability, someone must execute the maliciously crafted file. These files can be executable even with the .dcm file extension. Anti-malware configurations at healthcare facilities often ignore medical imagery. DICOM files exist on systems that process protected health information, and successful exploitation could result in violations of regulatory compliance requirements such as HIPAA and FDA postmarket obligations.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108730 | |
https://github.com/d00rt/pedicom | Exploit Third Party Advisory |
https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_%28DICOM%29_file_format_standard_-_Markel_Picado_Ortiz_%28d00rt%29.pdf | |
https://labs.cylera.com/2019.04.16/pe-dicom-medical-malware | Exploit Technical Description Third Party Advisory |
https://www.praetorian.com/blog/elfdicom-poc-malware-polyglot-exploiting-linux-based-medical-devices/ | |
http://www.securityfocus.com/bid/108730 | |
https://github.com/d00rt/pedicom | Exploit Third Party Advisory |
https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_%28DICOM%29_file_format_standard_-_Markel_Picado_Ortiz_%28d00rt%29.pdf | |
https://labs.cylera.com/2019.04.16/pe-dicom-medical-malware | Exploit Technical Description Third Party Advisory |
Configurations
History
24 Jul 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An issue was discovered in the DICOM Part 10 File Format in the NEMA DICOM Standard 1995 through 2019b and continuing in current implementations. The 128-byte preamble of a DICOM file that complies with this specification can contain arbitrary executable headers for multiple operating systems, including Portable Executable (PE) files for Windows and Executable and Linkable Format (ELF) files for Linux-based systems. This space is left unspecified so that dual-purpose files can be created. For example, dual-purpose TIFF/DICOM files are used in digital whole slide imaging applications in medicine. This design flaw enables system-wide compromise as malicious DICOM files are routinely shared between medical devices and hospital systems and transported via removable media for patient care coordination. To exploit this vulnerability, someone must execute the maliciously crafted file. These files can be executable even with the .dcm file extension. Anti-malware configurations at healthcare facilities often ignore medical imagery. DICOM files exist on systems that process protected health information, and successful exploitation could result in violations of regulatory compliance requirements such as HIPAA and FDA postmarket obligations. | |
References |
|
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/108730 - | |
References | () https://github.com/d00rt/pedicom - Exploit, Third Party Advisory | |
References | () https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_%28DICOM%29_file_format_standard_-_Markel_Picado_Ortiz_%28d00rt%29.pdf - | |
References | () https://labs.cylera.com/2019.04.16/pe-dicom-medical-malware - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2019-05-02 22:29
Updated : 2025-07-24 17:15
NVD link : CVE-2019-11687
Mitre link : CVE-2019-11687
CVE.ORG link : CVE-2019-11687
JSON object : View
Products Affected
nema
- dicom_standard
CWE
CWE-20
Improper Input Validation