Cyber Posture

CVE-2026-5444

High

Published: 09 April 2026

Published
09 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
EPSS Score 0.0001 2.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5444 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Orthanc-Server Orthanc. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 2.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious File (T1204.002) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the heap buffer overflow in Orthanc's PAM image parsing by requiring timely application of vendor patches addressing the integer overflow in buffer size calculation.

prevent

Requires validation of image dimensions and sizes in crafted PAM images within DICOM files to prevent integer overflows during buffer allocation.

prevent

Implements memory protections such as heap hardening and bounds checking to mitigate exploitation of the heap buffer overflow during pixel processing writes.

MITRE ATT&CK Enterprise TechniquesAI

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Vulnerability triggered via processing crafted DICOM file (T1204.002); heap buffer overflow enables application crashes via exploitation (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A heap buffer overflow vulnerability exists in the PAM image parsing logic. When Orthanc processes a crafted PAM image embedded in a DICOM file, image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen values can cause an integer overflow…

more

during buffer size calculation, resulting in the allocation of a small buffer followed by a much larger write operation during pixel processing.

Deeper analysisAI

CVE-2026-5444 is a heap buffer overflow vulnerability in the PAM image parsing logic of Orthanc. The issue arises when Orthanc processes a crafted PAM image embedded in a DICOM file, where image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen values trigger an integer overflow during buffer size calculation, resulting in allocation of a small buffer followed by a much larger write operation during pixel processing. It is classified under CWE-787 with a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H) and was published on 2026-04-09.

Exploitation requires local access, low attack complexity, no privileges, and user interaction, such as processing a malicious DICOM file. A local attacker can achieve high integrity and availability impacts, with no confidentiality impact, potentially leading to data corruption or system crashes via the buffer overflow.

Mitigation details are available in related advisories, including CERT KB at https://kb.cert.org/vuls/id/536588, the Orthanc website at https://www.orthanc-server.com/, and https://www.machinespirits.de/.

Details

CWE(s)

Affected Products

orthanc-server
orthanc
≤ 1.12.11

CVEs Like This One

CVE-2026-5443Same product: Orthanc-Server Orthanc
CVE-2026-5442Same product: Orthanc-Server Orthanc
CVE-2026-5440Same product: Orthanc-Server Orthanc
CVE-2026-5438Same product: Orthanc-Server Orthanc
CVE-2026-5441Same product: Orthanc-Server Orthanc
CVE-2026-5439Same product: Orthanc-Server Orthanc
CVE-2026-5437Same product: Orthanc-Server Orthanc
CVE-2025-0896Same product: Orthanc-Server Orthanc
CVE-2026-5445Same product: Orthanc-Server Orthanc
CVE-2026-23715Shared CWE-787

References