Metrics
Affected Vendors & Products
Solution
Medixant recommends users download the v2025.1 or later version https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe of their software.
Workaround
If users are unable to update to the new version, Medixant recommends the following: * Disable the display of available updates via this command reg add "HKCU\Software\RadiAnt Viewer" /t REG_DWORD /v CheckUpdate /d 0 /f. * Do not check manually for updates ("Check for updates now" from the toolbar menu). * Ignore any update notifications coming from RadiAnt DICOM Viewer, download the latest version directly in the web browser from https://www.radiantviewer.com https://www.radiantviewer.com/ . * Check the downloaded RadiAnt DICOM Viewer installation package with antivirus software before running it.
Fri, 21 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 21 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server's response and deliver a malicious update to the user. | |
Title | Medixant RadiAnt DICOM Viewer Improper Certificate Validation | |
Weaknesses | CWE-295 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-02-21T21:28:49.043Z
Reserved: 2025-02-03T18:33:02.870Z
Link: CVE-2025-1001

Updated: 2025-02-21T15:44:31.786Z

Status : Received
Published: 2025-02-21T01:15:09.533
Modified: 2025-02-21T01:15:09.533
Link: CVE-2025-1001

No data.

No data.