CVE-2025-25475
Published: 18 February 2025
Summary
CVE-2025-25475 is a high-severity NULL Pointer Dereference (CWE-476) vulnerability in Offis Dcmtk. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 41.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation of the NULL pointer dereference flaw in DCMTK via available patches to prevent DoS exploitation.
Requires validation of DICOM file inputs to block crafted files that trigger the NULL pointer dereference crash.
Ensures secure error handling to avoid application crashes from NULL pointer dereferences without compromising availability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
NULL pointer dereference in DICOM parser enables remote unauthenticated application crash/DoS via crafted file, directly matching application exploitation for endpoint denial of service.
NVD Description
A NULL pointer dereference in the component /libsrc/dcrleccd.cc of DCMTK v3.6.9+ DEV allows attackers to cause a Denial of Service (DoS) via a crafted DICOM file.
Deeper analysisAI
CVE-2025-25475 is a NULL pointer dereference vulnerability (CWE-476) affecting the /libsrc/dcrleccd.cc component in DCMTK v3.6.9+ DEV versions. Published on 2025-02-18, it enables attackers to trigger a Denial of Service (DoS) by processing a crafted DICOM file. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting high severity due to its network accessibility, low complexity, and significant availability impact with no privileges or user interaction required.
Remote, unauthenticated attackers can exploit this vulnerability by supplying a malicious DICOM file to any DCMTK-based application or service that parses such files, such as medical imaging systems. Exploitation leads to an application crash via the NULL pointer dereference, resulting in DoS without affecting confidentiality or integrity.
Mitigation patches are available in DCMTK's repository via commit bffa3e9116abb7038b432443f16b1bd390e80245, accessible through the project's Git and GitHub mirrors. Debian LTS has also addressed the issue in an announcement dated 2025/06. Security practitioners should update affected DCMTK instances and validate DICOM inputs where possible.
Details
- CWE(s)