Description
A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storescp.cc of the component storescp. Performing a manipulation results in os command injection. Remote exploitation of the attack is possible. The patch is named edbb085e45788dccaf0e64d71534cfca925784b8. Applying a patch is the recommended action to fix this issue.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Execution
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in OFFIS DCMTK’s storescp application, within the executeOnReception/executeOnEndOfStudy functions in storescp.cc. An attacker can manipulate input to trigger OS command injection, allowing execution of arbitrary commands on the host, which constitutes remote code execution and can compromise confidentiality, integrity, and availability of the affected system.

Affected Systems

Users operating OFFIS DCMTK 3.7.0 or earlier, specifically the storescp component of the DCMTK package, are susceptible to this flaw.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity; EPSS data is not available and the vulnerability is not currently listed in CISA KEV. Exploitation requires remote access to the DCMTK storescp service and the ability to manipulate input that triggers executeOnReception or executeOnEndOfStudy, making the attack vector remote. Without remediation, an attacker could execute commands with the privileges of the running service, potentially gaining full system control.

Generated by OpenCVE AI on April 6, 2026 at 17:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch corresponding to commit edbb085e45788dccaf0e64d71534cfca925784b8
  • Verify that the patch has been applied and the compromised functions are no longer exposed
  • Monitor the DCMTK environment for any signs of exploitation and check for additional vendor updates

Generated by OpenCVE AI on April 6, 2026 at 17:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storescp.cc of the component storescp. Performing a manipulation results in os command injection. Remote exploitation of the attack is possible. The patch is named edbb085e45788dccaf0e64d71534cfca925784b8. Applying a patch is the recommended action to fix this issue.
Title OFFIS DCMTK storescp storescp.cc executeOnEndOfStudy os command injection
First Time appeared Offis
Offis dcmtk
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*
Vendors & Products Offis
Offis dcmtk
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T14:06:11.702Z

Reserved: 2026-04-06T07:55:05.388Z

Link: CVE-2026-5663

cve-icon Vulnrichment

Updated: 2026-04-07T14:06:03.815Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T15:17:16.253

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:32:45Z

Weaknesses