Cyber Posture

CVE-2024-47796

HighPublic PoC

Published: 13 January 2025

Published
13 January 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-47796 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Offis Dcmtk. Its CVSS base score is 8.4 (High).

Operationally, ranked at the 18.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through patching directly eliminates the improper array index validation vulnerability in DCMTK, preventing out-of-bounds writes from specially crafted DICOM files.

prevent

Information input validation enforces proper bounds checking on DICOM file arrays, directly addressing the improper array index validation that leads to out-of-bounds writes.

prevent

Memory protection mechanisms like non-executable memory and address space randomization mitigate the exploitability of out-of-bounds writes triggered by malformed DICOM files.

NVD Description

An improper array index validation vulnerability exists in the nowindow functionality of OFFIS DCMTK 3.6.8. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

Deeper analysisAI

CVE-2024-47796 is an improper array index validation vulnerability in the nowindow functionality of OFFIS DCMTK version 3.6.8. The flaw enables a specially crafted DICOM file to trigger an out-of-bounds write, classified under CWE-119 with a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A local attacker requires no privileges or user interaction to exploit this vulnerability by providing a malicious DICOM file to an affected DCMTK instance. Successful exploitation can result in high-impact consequences, including unauthorized data disclosure, modification, or system disruption due to the out-of-bounds write.

Mitigation is addressed in the DCMTK git commit 89a6e399f1e17d08a8bc8cdaa05b2ac9a50cd4f6, as detailed in the Talos Intelligence advisory TALOS-2024-2122. Debian LTS announcements confirm patches for affected systems in their January and June 2025 updates.

Details

CWE(s)

Affected Products

offis
dcmtk
3.6.8

CVEs Like This One

CVE-2024-52333Same product: Offis Dcmtk
CVE-2026-5663Same product: Offis Dcmtk
CVE-2025-25475Same product: Offis Dcmtk
CVE-2026-4710Shared CWE-119
CVE-2026-3394Shared CWE-119
CVE-2024-44238Shared CWE-119
CVE-2025-7775Shared CWE-119
CVE-2026-3437Shared CWE-119
CVE-2025-8044Shared CWE-119
CVE-2026-33847Shared CWE-119

References