{"api_version":"1","generated_at":"2026-04-14T22:37:43+00:00","cve":"CVE-2026-5442","urls":{"html":"https://cve.report/CVE-2026-5442","api":"https://cve.report/api/cve/CVE-2026-5442.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5442","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5442"},"summary":{"title":"Heap Buffer Overflow in DICOM Image Decoder via VR UL Dimensions","description":"A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large dimensions to be processed. This causes an integer overflow during frame size calculation and results in out-of-bounds memory access during image decoding.","state":"PUBLISHED","assigner":"certcc","published_at":"2026-04-09 15:16:16","updated_at":"2026-04-14 20:19:46"},"problem_types":["CWE-787","CWE-190 Integer Overflow or Wraparound"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://kb.cert.org/vuls/id/536588","name":"https://kb.cert.org/vuls/id/536588","refsource":"cret@cert.org","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.orthanc-server.com/","name":"https://www.orthanc-server.com/","refsource":"cret@cert.org","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.machinespirits.de/","name":"https://www.machinespirits.de/","refsource":"cret@cert.org","tags":["Not Applicable"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5442","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5442","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Orthanc","product":"DICOM Server","version":"affected 1.12.10 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"5442","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"orthanc-server","cpe5":"orthanc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"5442","cve":"CVE-2026-5442","epss":"0.000170000","percentile":"0.039230000","score_date":"2026-04-13","updated_at":"2026-04-14 00:12:04"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2026-5442","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-14T15:12:07.779154Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-14T16:34:39.322Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"DICOM Server","vendor":"Orthanc","versions":[{"lessThanOrEqual":"1.12.10","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large dimensions to be processed. This causes an integer overflow during frame size calculation and results in out-of-bounds memory access during image decoding."}],"problemTypes":[{"descriptions":[{"description":"CWE-190 Integer Overflow or Wraparound","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-09T14:43:43.571Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"url":"https://www.orthanc-server.com/"},{"url":"https://www.machinespirits.de/"},{"url":"https://kb.cert.org/vuls/id/536588"}],"source":{"discovery":"UNKNOWN"},"title":"Heap Buffer Overflow in DICOM Image Decoder via VR UL Dimensions","x_generator":{"engine":"VINCE 3.0.35","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2026-5442"}}},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2026-5442","datePublished":"2026-04-09T14:43:43.571Z","dateReserved":"2026-04-02T19:22:48.196Z","dateUpdated":"2026-04-14T16:34:39.322Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-09 15:16:16","lastModifiedDate":"2026-04-14 20:19:46","problem_types":["CWE-787","CWE-190 Integer Overflow or Wraparound"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.12.11","matchCriteriaId":"A259075D-8B77-4B04-BC42-3E5ABE9DFE1F"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5442","Ordinal":"1","Title":"Heap Buffer Overflow in DICOM Image Decoder via VR UL Dimensions","CVE":"CVE-2026-5442","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5442","Ordinal":"1","NoteData":"A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large dimensions to be processed. This causes an integer overflow during frame size calculation and results in out-of-bounds memory access during image decoding.","Type":"Description","Title":"Heap Buffer Overflow in DICOM Image Decoder via VR UL Dimensions"}]}}}