CVE-2026-5663
Published: 06 April 2026
Description
A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storescp.cc of the component storescp. Performing a manipulation results in os command injection. Remote exploitation of the attack is possible.…
more
The patch is named edbb085e45788dccaf0e64d71534cfca925784b8. Applying a patch is the recommended action to fix this issue.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the OS command injection vulnerability in DCMTK storescp by requiring timely patching of the specific flaw via commit edbb085e45788dccaf0e64d71534cfca925784b8.
Prevents remote exploitation of the command injection by enforcing validation of manipulated inputs to executeOnReception and executeOnEndOfStudy functions in storescp.cc.
Limits the impact of arbitrary OS command execution by ensuring the storescp process operates with least privilege, reducing potential damage from exploitation.
Security SummaryAI
CVE-2026-5663 is an OS command injection vulnerability affecting OFFIS DCMTK versions up to 3.7.0. The flaw resides in the storescp component, specifically within the executeOnReception and executeOnEndOfStudy functions in the file dcmnet/apps/storescp.cc. It is classified under CWE-77 and CWE-78, with a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and lack of prerequisites.
Remote attackers can exploit this vulnerability without authentication by manipulating inputs to the affected functions, leading to arbitrary OS command execution on the target system. Successful exploitation grants limited impact on confidentiality, integrity, and availability, potentially allowing attackers to run commands in the context of the storescp process.
Mitigation is addressed by applying the patch commit edbb085e45788dccaf0e64d71534cfca925784b8 available in the DCMTK GitHub repository. Additional details are provided in advisories from support.dcmtk.org (issue 1194), machinespirits.com, and vuldb.com entries.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote OS command injection in public-facing storescp network service enables T1190 (Exploit Public-Facing Application) and facilitates arbitrary Unix shell command execution (T1059.004).