An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `grayscale_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 16 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `grayscale_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data
Weaknesses CWE-119
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-12-16T21:32:54.971Z

Reserved: 2025-07-07T08:19:31.283Z

Link: CVE-2025-53618

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-16T22:15:47.670

Modified: 2025-12-16T22:15:47.670

Link: CVE-2025-53618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses