PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-35975 MicroDicom CVE debrief

MicroDicom DICOM Viewer is affected by an out-of-bounds write that may allow arbitrary code execution when a user opens a malicious DCM file. CISA published the advisory as ICSMA-25-121-01 on 2025-05-01 and later revised it on 2025-05-06 for typos. MicroDicom’s remediation is to update DICOM Viewer to version 2025.2 or later.

Vendor
MicroDicom
Product
DICOM Viewer
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-01
Original CVE updated
2025-05-06
Advisory published
2025-05-01
Advisory updated
2025-05-06

Who should care

Organizations and users running MicroDicom DICOM Viewer, especially healthcare, imaging, and workstation teams that handle DCM files from external or untrusted sources.

Technical summary

The supplied advisory describes an out-of-bounds write in MicroDicom DICOM Viewer with the user interaction condition that a malicious DCM file must be opened for exploitation. The provided CVSS v3.1 vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, reflecting high impact once triggered.

Defensive priority

High

Recommended defensive actions

  • Update MicroDicom DICOM Viewer to version 2025.2 or later, per the vendor remediation in the advisory.
  • Treat DCM files from untrusted or external sources as potentially malicious and limit where they can be opened.
  • Use least-privilege workstation practices and restrict software exposure on systems that do not need DICOM viewing.
  • Verify remediation across affected endpoints and keep the CISA advisory and vendor download guidance available for follow-up.

Evidence notes

This debrief is based on the supplied CISA CSAF advisory ICSMA-25-121-01 (published 2025-05-01, revised 2025-05-06) and the vendor remediation noted there. The supplied enrichment does not list a KEV entry or ransomware campaign use.

Official resources

Publicly disclosed by CISA in ICSMA-25-121-01 on 2025-05-01; revised 2025-05-06 for typo fixes. This debrief uses the supplied advisory and official links only.