3 Critical Vulnerabilities Found in Merge DICOM Toolkit

What You Should Know:

– Security researchers at Nozomi Networks Labs identified three vulnerabilities in the Merge DICOM Toolkit C/C++ SDK (versions prior to v5.18). 

– These vulnerabilities could be exploited by attackers to crash medical imaging systems through seemingly harmless actions like opening a DICOM file or processing network data.

The Importance of the Merge DICOM Toolkit

In the world of medical imaging, the Merge DICOM Toolkit plays a vital role. This software library ensures seamless handling of medical images (like X-rays and MRIs) by allowing them to be stored, shared, and accessed across various healthcare systems. It’s a critical piece of technology for accurate diagnoses and timely treatments.

Potential Impact on Hospitals

A compromised medical imaging system could have serious consequences. It could disrupt workflows, delay diagnoses, and even impact patient care. In a hospital setting, where every second counts, such disruptions can be critical.

How Attackers Could Exploit These Vulnerabilities

These vulnerabilities could be exploited by attackers to disrupt critical healthcare systems:

  • CVE-2024-23912 & CVE-2024-23913: These vulnerabilities allow attackers to crash DICOM viewers by sending them malformed DICOM files. This could potentially delay diagnoses and treatment.
  • CVE-2024-23914: This vulnerability could enable attackers to exploit weaknesses in the network communication protocol used by DICOM-enabled devices (like ultrasound or CT machines). A successful attack could crash these devices, hindering their ability to function.

Patching and Remediation

Fortunately, Merge by Merative has addressed these vulnerabilities in the latest release of the Merge DICOM Toolkit C/C++ SDK (v5.18). Here’s what you can do:

  • Healthcare providers: Urgently check if any of your medical imaging software uses a vulnerable version (prior to v5.18) of the Merge DICOM Toolkit. If so, update to the latest version (v5.18) immediately.
  • Software developers: If you develop healthcare software that utilizes the Merge DICOM Toolkit, ensure you are using the latest patched version (v5.18) to protect your users from these vulnerabilities.

The Importance of Software Supply Chain Security

This incident highlights the importance of software supply chain security in the healthcare industry. Vulnerabilities in widely used libraries like the Merge DICOM Toolkit can create significant security risks for healthcare systems. By working together, software developers, healthcare providers, and security researchers can ensure the safety and security of critical medical technologies.