{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-2029","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-06T08:35:26.796Z","datePublished":"2025-03-06T15:00:11.035Z","dateUpdated":"2025-03-06T16:07:02.574Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-06T15:00:11.035Z"},"title":"MicroDicom DICOM Viewer mDicom.exe memory corruption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"MicroDicom","product":"DICOM Viewer","versions":[{"version":"2025.1 Build 3321","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in MicroDicom DICOM Viewer 2025.1 Build 3321. It has been classified as critical. Affected is an unknown function of the file mDicom.exe. The manipulation leads to memory corruption. The attack needs to be approached locally. It is recommended to upgrade the affected component. The vendor quickly confirmed the existence of the vulnerability and fixed it in the latest beta."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in MicroDicom DICOM Viewer 2025.1 Build 3321 ausgemacht. Es betrifft eine unbekannte Funktion der Datei mDicom.exe. Durch Beeinflussen mit unbekannten Daten kann eine memory corruption-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-06T09:40:59.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"0x20z (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.298770","name":"VDB-298770 | MicroDicom DICOM Viewer mDicom.exe memory corruption","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.298770","name":"VDB-298770 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.506579","name":"Submit #506579 | MicroDicom MicroDicomViewer 2025.1(Build3321) Memory Access Violation","tags":["third-party-advisory"]},{"url":"https://www.microdicom.com/beta.html","tags":["patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-06T16:06:52.496391Z","id":"CVE-2025-2029","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-06T16:07:02.574Z"}}]}}