Remote Code Execution Vulnerability in Sante DICOM Viewer Pro
CVE-2022-24062

7.8HIGH

Key Information:

Vendor

Sante

Vendor
CVE Published:
18 February 2022

What is CVE-2022-24062?

This vulnerability enables remote attackers to execute arbitrary code on installations of Sante DICOM Viewer Pro version 13.2.0.21165. Exploitation requires user interaction, as the target must either visit a malicious web page or open a compromised file. The flaw stems from improper validation during the parsing of JP2 files, allowing an attacker to manipulate the application into executing code in the context of the current process. Further details are available in the advisory provided by the Zero Day Initiative.

Affected Version(s)

DICOM Viewer Pro 13.2.0.21165

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mat Powell of Trend Micro Zero Day Initiative
.