<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dcmtk — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dcmtk/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 15:17:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dcmtk/feed.xml" rel="self" type="application/rss+xml"/><item><title>OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dcmtk-command-injection/</link><pubDate>Mon, 06 Apr 2026 15:17:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dcmtk-command-injection/</guid><description>A remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-5663, affects OFFIS DCMTK (Dicom ToolKit) versions up to 3.7.0. The vulnerability is located within the <code>storescp</code> application, specifically in the <code>executeOnReception</code> and <code>executeOnEndOfStudy</code> functions of the <code>dcmnet/apps/storescp.cc</code> file. An attacker can exploit this flaw by manipulating input parameters processed by these functions, leading to arbitrary OS command execution on the server. Remote exploitation is possible, making this a critical issue for systems utilizing vulnerable DCMTK versions. Applying the patch edbb085e45788dccaf0e64d71534cfca925784b8, available on the DCMTK GitHub repository, is the recommended course of action.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable OFFIS DCMTK instance running <code>storescp</code> exposed on the network.</li>
<li>The attacker crafts a malicious DICOM request containing specially crafted parameters designed to exploit the command injection vulnerability in the <code>executeOnReception</code> or <code>executeOnEndOfStudy</code> functions.</li>
<li>The <code>storescp</code> application receives the malicious DICOM request.</li>
<li>The vulnerable <code>executeOnReception</code> or <code>executeOnEndOfStudy</code> functions process the attacker-controlled parameters without proper sanitization.</li>
<li>The application attempts to execute a system command using the unsanitized input, injecting attacker-supplied code.</li>
<li>The injected code executes arbitrary commands on the underlying operating system with the privileges of the <code>storescp</code> process.</li>
<li>The attacker gains the ability to read sensitive files, modify system configurations, or execute malicious binaries.</li>
<li>The attacker establishes persistence on the system or pivots to other internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5663 can lead to complete compromise of the affected system. This allows an attacker to execute arbitrary commands, potentially leading to data theft, denial of service, or further propagation within the network. The healthcare sector, which relies heavily on DICOM for medical imaging, is particularly at risk. Unpatched DCMTK instances expose sensitive patient data and critical infrastructure to potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch <code>edbb085e45788dccaf0e64d71534cfca925784b8</code> from the DCMTK GitHub repository to remediate CVE-2026-5663 immediately.</li>
<li>Monitor network traffic for suspicious activity originating from or directed to DCMTK servers, specifically looking for unusual command execution patterns (see Sigma rule below).</li>
<li>Implement input validation and sanitization for all user-supplied data processed by DCMTK applications to prevent command injection vulnerabilities in the future.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>dcmtk</category><category>cve-2026-5663</category><category>storescp</category></item></channel></rss>