Description
A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Denial of Service
Action: Immediate Patch
AI Analysis

Impact

Orthanc automatically extracts ZIP archives uploaded to certain endpoints and relies on metadata describing the uncompressed size of each archived file. An attacker can craft a small ZIP archive containing a forged size value that far exceeds realistic limits. During extraction the server allocates buffers based on that forged value, causing extreme memory usage and potentially exhausting the system’s memory. This flaw is classified as CWE‑770, Excessive Resource Consumption, leading to a denial of service where the server becomes unresponsive, restarts, or crashes, disrupting legitimate DICOM operations.

Affected Systems

The vulnerability affects Orthanc DICOM Server products that automatically decompress ZIP uploads. No specific version numbers are listed, so any Orthanc installation using the default ZIP extraction routine is potentially vulnerable.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that an attacker can exploit the flaw remotely by uploading a malicious ZIP file to any endpoint that accepts ZIP data; authentication or additional privileges are not explicitly required, but this is inferred from the fact that the server processes the uploads without validating size metadata. The attack vector is inferred from the processing of uploaded ZIP archives.

Generated by OpenCVE AI on April 17, 2026 at 09:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Orthanc update that fixes ZIP metadata validation
  • If an upgrade is not possible, block or disable automatic ZIP extraction on the affected endpoints
  • Validate or sanitize ZIP metadata before extraction to ensure uncompressed sizes stay within realistic limits
  • Ensure that any temporary buffers allocated during extraction are bounded and checked

Generated by OpenCVE AI on April 17, 2026 at 09:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-789

Wed, 15 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc-server
Orthanc-server orthanc
Weaknesses CWE-770
CPEs cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:*
Vendors & Products Orthanc-server
Orthanc-server orthanc

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-789

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc
Orthanc dicom Server
Vendors & Products Orthanc
Orthanc dicom Server

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction.
Title Memory Exhaustion via Forged ZIP Metadata
References

Subscriptions

Orthanc Dicom Server
Orthanc-server Orthanc
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-14T16:34:14.439Z

Reserved: 2026-04-02T19:22:13.583Z

Link: CVE-2026-5439

cve-icon Vulnrichment

Updated: 2026-04-14T15:15:08.031Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T15:16:15.443

Modified: 2026-04-15T19:32:22.333

Link: CVE-2026-5439

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T09:30:14Z

Weaknesses