


Perceptive Security
SOC/SIEM Consultancy

A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storesc…
Published:
5 April 2026 at 22:00:00
Alert date:
6 April 2026 at 16:03:20
Source:
nvd.nist.gov
Critical Infrastructure, Enterprise Applications
A critical security vulnerability has been discovered in OFFIS DCMTK up to version 3.7.0. The flaw affects the executeOnReception and executeOnEndOfStudy functions in the storescp component, specifically in the dcmnet/apps/storescp.cc file. Exploitation of this vulnerability can lead to OS command injection attacks. The vulnerability can be exploited remotely, making it particularly dangerous. A patch has been released with the identifier edbb085e45788dccaf0e64d71534cfca925784b8. Organizations using affected versions of DCMTK should immediately apply the available patch to mitigate this security risk.
Technical details
Mitigation steps:
Affected products:
OFFIS DCMTK
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-5663
https://github.com/DCMTK/dcmtk/commit/edbb085e45788dccaf0e64d71534cfca925784b8
https://machinespirits.com/advisory/2e1627/
https://support.dcmtk.org/redmine/issues/1194
https://vuldb.com/submit/786061
https://vuldb.com/vuln/355486
https://vuldb.com/vuln/355486/cti
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
