Description
A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storescp.cc of the component storescp. Performing a manipulation results in os command injection. Remote exploitation of the attack is possible. The patch is named edbb085e45788dccaf0e64d71534cfca925784b8. Applying a patch is the recommended action to fix this issue.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Execution
Action: Patch Now
AI Analysis

Impact

The flaw is located in OFFIS DCMTK’s storescp application, specifically within the executeOnReception and executeOnEndOfStudy functions defined in storescp.cc. A attacker can craft input that causes these functions to invoke system commands, leading to OS command injection. This allows remote attackers to run arbitrary commands with the privileges of the running storescp service, effectively giving full control over the host system.

Affected Systems

Any installation of OFFIS DCMTK up to and including version 3.7.0 is affected. The vulnerability is confined to the storescp component of the DCMTK package. Users of the DCMTK distribution who run the storescp service are at risk.

Risk and Exploitability

The CVSS base score is 6.9, which indicates moderate severity, while the EPSS shows a probability of less than 1 %, implying a very low likelihood of exploitation at this time. The flaw is not listed in CISA’s KEV catalog. Exploitation requires remote access to the DCMTK storescp service and the ability to supply a specially crafted dataset that triggers the vulnerable function, thereby enabling command execution.

Generated by OpenCVE AI on April 29, 2026 at 00:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch provided in commit edbb085e45788dccaf0e64d71534cfca925784b8 to update DCMTK to a fixed version.
  • Restart the storescp service to ensure the patched binaries are loaded.
  • Restrict or temporarily disable external access to the storescp service until the patch is applied, and monitor logs for any anomalous command execution attempts.

Generated by OpenCVE AI on April 29, 2026 at 00:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storescp.cc of the component storescp. Performing a manipulation results in os command injection. Remote exploitation of the attack is possible. The patch is named edbb085e45788dccaf0e64d71534cfca925784b8. Applying a patch is the recommended action to fix this issue.
Title OFFIS DCMTK storescp storescp.cc executeOnEndOfStudy os command injection
First Time appeared Offis
Offis dcmtk
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*
Vendors & Products Offis
Offis dcmtk
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T14:06:11.702Z

Reserved: 2026-04-06T07:55:05.388Z

Link: CVE-2026-5663

cve-icon Vulnrichment

Updated: 2026-04-07T14:06:03.815Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T15:17:16.253

Modified: 2026-04-27T18:43:25.493

Link: CVE-2026-5663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T00:45:26Z

Weaknesses