Endpoint/Device Security, Vulnerability Management
CISA alerts to vulnerabilities in some OFFIS DCMTK, Hillrom medical devices

Airmen wheel a patient into the emergency room Feb. 22, 2022, at Eglin Air Force Base, Fla. (Senior Airman Amanda A. Flower-Raschella/Air Force)
In the last week, the Cybersecurity and Infrastructure and Security Agency issued alerts for high-risk vulnerabilities found in certain OFFIS DCMTK and Hillrom Welch Allyn medical devices.The latest alert warns public health and healthcare sector entities of three vulnerabilities in all versions prior to 3.6.7 of DCMTK, the libraries and software that process DICOM image files. In general, the 30-year-old DICOM standard is notoriously vulnerable and easily exploitable when left exposed to the internet.The OFFIS DCMTK is a software able to examine, construct, and convert DICOM image files, as well as handle offline media, and send and receive images over a network connection.The alert shows the DCMTK has two path traversal flaws ranked 7.5 in severity. A successful exploit of either could allow a threat actor to write DICOM files into arbitrary directories under controlled names and could spur remote code execution. The third flaw, ranked 6.5 in severity is caused by a NULL pointer deference vulnerability, which occurs when processing DICOM files. An exploit could cause a denial-of-service condition.All three flaws are exploitable from an adjacent network with low attack complexity. Fortunately, there have been known public exploits specifically targeting these vulnerabilities. The bugs were reported to CISA by Noam Moshe, a vulnerability researcher at Claroty.Healthcare entities are being urged to update the impacted DCMTK products to the latest version, while CISA recommends users ensure network exposure is minimized and not directly accessible to the internet.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds