Impact
The vulnerability resides in OFFIS DCMTK’s storescp application, within the executeOnReception/executeOnEndOfStudy functions in storescp.cc. An attacker can manipulate input to trigger OS command injection, allowing execution of arbitrary commands on the host, which constitutes remote code execution and can compromise confidentiality, integrity, and availability of the affected system.
Affected Systems
Users operating OFFIS DCMTK 3.7.0 or earlier, specifically the storescp component of the DCMTK package, are susceptible to this flaw.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity; EPSS data is not available and the vulnerability is not currently listed in CISA KEV. Exploitation requires remote access to the DCMTK storescp service and the ability to manipulate input that triggers executeOnReception or executeOnEndOfStudy, making the attack vector remote. Without remediation, an attacker could execute commands with the privileges of the running service, potentially gaining full system control.
OpenCVE Enrichment