{"containers":{"cna":{"affected":[{"product":"DCMTK","vendor":"OFFIS","versions":[{"lessThan":"3.6.7","status":"affected","version":"unspecified","versionType":"custom"}]}],"datePublic":"2022-06-23T00:00:00.000Z","descriptions":[{"lang":"en","value":"OFFIS DCMTK's (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-24T15:00:20.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01"}],"source":{"advisory":"ICSMA-22-174-01","discovery":"UNKNOWN"},"title":"OFFIS DCMTK Path Traversal","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2022-06-23T22:19:00.000Z","ID":"CVE-2022-2119","STATE":"PUBLIC","TITLE":"OFFIS DCMTK Path Traversal"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"DCMTK","version":{"version_data":[{"version_affected":"<","version_value":"3.6.7"}]}}]},"vendor_name":"OFFIS"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"OFFIS DCMTK's (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01","refsource":"MISC","url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01"}]},"source":{"advisory":"ICSMA-22-174-01","discovery":"UNKNOWN"}}},"adp":[{"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsma-22-174-01"},{"url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00025.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:26:43.951Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T17:28:29.247124Z","id":"CVE-2022-2119","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T17:52:02.215Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2022-2119","datePublished":"2022-06-24T15:00:20.534Z","dateReserved":"2022-06-17T00:00:00.000Z","dateUpdated":"2025-11-03T19:26:43.951Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}