Description
An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of `DicomImageDecoder.cpp`. The `PMSCT_RLE1` decompression routine, which decodes the proprietary Philips Compression format, does not properly validate escape markers placed near the end of the compressed data stream. A crafted sequence at the end of the buffer can cause the decoder to read beyond the allocated memory region and leak heap data into the rendered image output.
Published: 2026-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch Now
AI Analysis

Impact

An out-of-bounds read occurs in the DecodePsmctRle1 routine of Orthanc’s DICOM image decoder. This is a CWE-125 vulnerability. The routine, used for Philips proprietary RLE1 compression, fails to validate escape markers near the stream’s end, allowing a specially crafted sequence to cause the decoder to read beyond its allocated buffer. This read can leak adjacent heap memory into the rendered image, exposing potentially sensitive data that resides near the buffer.

Affected Systems

Orthanc’s DICOM Server software is affected. All builds that include the DecodePsmctRle1 routine are vulnerable, and the CVE entry does not restrict the version window, implying that current releases with PMSCT_RLE1 support are at risk.

Risk and Exploitability

The flaw carries a CVSS score of 7.1, indicating moderate to high severity, while its EPSS score is below 1% and it is not listed in the CISA KEV catalog, suggesting low exploitation likelihood at this time. The likely attack vector is inferred to be the network interface that accepts DICOM uploads; an attacker would need to supply a malicious DICOM file containing a crafted PMSCT_RLE1 payload. If processed, the attacker could read memory contents and potentially obtain confidential information.

Generated by OpenCVE AI on April 15, 2026 at 22:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Orthanc website or vendor portals for an update that addresses this decoding issue and apply the released patch.
  • If no patch has been released, consider upgrading to a newer Orthanc release that eliminates the flaw.
  • Implement network or file‑level controls to restrict DICOM uploads to trusted clients and enforce size limits to reduce the likelihood of successful exploitation.

Generated by OpenCVE AI on April 15, 2026 at 22:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Tue, 14 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc-server
Orthanc-server orthanc
CPEs cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:*
Vendors & Products Orthanc-server
Orthanc-server orthanc

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CWE-20

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Orthanc
Orthanc dicom Server
Vendors & Products Orthanc
Orthanc dicom Server

Thu, 09 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of `DicomImageDecoder.cpp`. The `PMSCT_RLE1` decompression routine, which decodes the proprietary Philips Compression format, does not properly validate escape markers placed near the end of the compressed data stream. A crafted sequence at the end of the buffer can cause the decoder to read beyond the allocated memory region and leak heap data into the rendered image output.
Title Out-of-Bounds Read in DicomImageDecoder (PMSCT_RLE1 Decompression)
References

Subscriptions

Orthanc Dicom Server
Orthanc-server Orthanc
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-14T16:35:04.748Z

Reserved: 2026-04-02T19:22:35.863Z

Link: CVE-2026-5441

cve-icon Vulnrichment

Updated: 2026-04-14T15:07:18.474Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T15:16:16.443

Modified: 2026-04-14T20:18:01.960

Link: CVE-2026-5441

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:45:16Z

Weaknesses