{"api_version":"1","generated_at":"2026-04-14T22:33:32+00:00","cve":"CVE-2026-5445","urls":{"html":"https://cve.report/CVE-2026-5445","api":"https://cve.report/api/cve/CVE-2026-5445.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5445","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5445"},"summary":{"title":"Out-of-Bounds Read in DicomImageDecoder (DecodeLookupTable)","description":"An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup table size. Crafted images containing indices larger than the palette size cause the decoder to read beyond allocated lookup table memory and expose heap contents in the output image.","state":"PUBLISHED","assigner":"certcc","published_at":"2026-04-09 15:16:16","updated_at":"2026-04-14 20:10:01"},"problem_types":["CWE-125","CWE-125 Out-of-bounds Read"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://kb.cert.org/vuls/id/536588","name":"https://kb.cert.org/vuls/id/536588","refsource":"cret@cert.org","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.orthanc-server.com/","name":"https://www.orthanc-server.com/","refsource":"cret@cert.org","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.machinespirits.de/","name":"https://www.machinespirits.de/","refsource":"cret@cert.org","tags":["Not Applicable"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5445","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5445","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Orthanc","product":"DICOM Server","version":"affected 1.12.10 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"5445","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"orthanc-server","cpe5":"orthanc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"5445","cve":"CVE-2026-5445","epss":"0.000170000","percentile":"0.039230000","score_date":"2026-04-13","updated_at":"2026-04-14 00:12:04"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2026-5445","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-14T15:08:58.289132Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-14T16:34:52.024Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"DICOM Server","vendor":"Orthanc","versions":[{"lessThanOrEqual":"1.12.10","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup table size. Crafted images containing indices larger than the palette size cause the decoder to read beyond allocated lookup table memory and expose heap contents in the output image."}],"problemTypes":[{"descriptions":[{"description":"CWE-125 Out-of-bounds Read","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-09T14:42:51.673Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"url":"https://www.orthanc-server.com/"},{"url":"https://www.machinespirits.de/"},{"url":"https://kb.cert.org/vuls/id/536588"}],"source":{"discovery":"UNKNOWN"},"title":"Out-of-Bounds Read in DicomImageDecoder (DecodeLookupTable)","x_generator":{"engine":"VINCE 3.0.35","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2026-5445"}}},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2026-5445","datePublished":"2026-04-09T14:42:51.673Z","dateReserved":"2026-04-02T19:23:30.637Z","dateUpdated":"2026-04-14T16:34:52.024Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-09 15:16:16","lastModifiedDate":"2026-04-14 20:10:01","problem_types":["CWE-125","CWE-125 Out-of-bounds Read"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:*","versionEndExcluding":"1.12.11","matchCriteriaId":"A259075D-8B77-4B04-BC42-3E5ABE9DFE1F"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5445","Ordinal":"1","Title":"Out-of-Bounds Read in DicomImageDecoder (DecodeLookupTable)","CVE":"CVE-2026-5445","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5445","Ordinal":"1","NoteData":"An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup table size. Crafted images containing indices larger than the palette size cause the decoder to read beyond allocated lookup table memory and expose heap contents in the output image.","Type":"Description","Title":"Out-of-Bounds Read in DicomImageDecoder (DecodeLookupTable)"}]}}}