Critical Vulnerabilities in Orthanc DICOM Server Threaten Healthcare Systems
Severity: High (Score: 72.9)
Sources: Rescana, Kb.Cert
Summary
Multiple critical vulnerabilities have been discovered in the Orthanc DICOM server, affecting all versions up to 1.12.10. These vulnerabilities, including CVE-2026-5442, CVE-2026-5438, and CVE-2026-5440, allow attackers to exploit unsafe arithmetic operations and insufficient validation of DICOM files, leading to server crashes, memory exhaustion, and potential remote code execution. The flaws can be triggered by submitting specially crafted DICOM files or HTTP requests, posing significant risks to healthcare systems that rely on Orthanc for medical imaging. Users are strongly advised to upgrade to version 1.12.11 or later to mitigate these threats. The vulnerabilities were publicly disclosed on April 9, 2026, and have been categorized as critical due to their potential impact on patient privacy and operational continuity. Key Points: • Critical vulnerabilities in Orthanc DICOM server affect all versions up to 1.12.10. • Exploitation can lead to server crashes, memory exhaustion, and remote code execution. • Immediate upgrade to version 1.12.11 or later is required to mitigate risks.
Key Entities
- DDoS (attack_type)
- Zero-day Exploit (attack_type)
- Machine Spirits UG (company)
- CVE-2026-5437 (cve)
- CVE-2026-5438 (cve)
- CVE-2026-5439 (cve)
- CVE-2026-5440 (cve)
- CVE-2026-5441 (cve)
- rescana.com (domain)
- Healthcare (industry)
- T1190 - Exploit Public-Facing Application (mitre_attack)
- Orthanc (platform)
- Orthanc Dicom Server (platform)