What's Happening?
Nine security vulnerabilities have been identified in the Orthanc Digital Imaging and Communications in Medicine (DICOM) server, which is widely used in healthcare and medical research for the automated analysis of medical images. These vulnerabilities,
tracked from CVE-2026-5437 to CVE-2026-5445, include issues such as heap-based buffer overflows, out-of-bounds reads, and memory exhaustion flaws. These defects can lead to server crashes, data leaks, and potentially allow attackers to execute arbitrary code remotely. The vulnerabilities were discovered by researchers at Machine Spirits and have been detailed in advisories by the CERT Coordination Center (CERT/CC). Users of Orthanc versions 1.12.10 and earlier are advised to update to version 1.12.11, which addresses these security issues.
Why It's Important?
The discovery of these vulnerabilities is significant as it highlights potential risks to healthcare systems that rely on Orthanc for medical image processing. Exploitation of these flaws could disrupt medical services by crashing servers or leaking sensitive patient data, which could have severe implications for patient privacy and healthcare operations. The ability for attackers to execute arbitrary code remotely poses a critical threat, potentially allowing unauthorized access to healthcare networks. This situation underscores the importance of robust cybersecurity measures in healthcare technology to protect sensitive data and ensure the continuity of medical services.
What's Next?
Healthcare organizations using Orthanc are expected to prioritize updating their systems to the latest version to mitigate these vulnerabilities. The CERT/CC advisory and Machine Spirits' findings may prompt further scrutiny and security audits of similar medical software systems to prevent future vulnerabilities. Additionally, there may be increased collaboration between cybersecurity experts and healthcare IT departments to enhance the security of medical data processing systems.











