TXOne Networks
Blog Post

Protecting Medical Data: Uncovering New Vulnerabilities in PACS Servers and DICOM Viewers

TXOne Networks

May 12, 2025
Share:

Author: Chizuru Toyama, TXOne Research

 

Background

Modern healthcare relies heavily on digital technology to streamline workflows and enhance patient care. One critical component in this digital ecosystem is the Picture Archiving and Communication System (PACS). PACS is a networked system used to electronically store, retrieve, manage, and share medical images. It replaces traditional film-based methods, eliminating the need for physical storage and manual handling of medical images.

By digitizing imaging processes, PACS enables healthcare professionals to instantly access images from various locations and devices. This not only speeds up diagnosis and treatment but also fosters better collaboration among medical teams.

Closely tied to PACS is the Digital Imaging and Communications in Medicine (DICOM) standard. DICOM defines the format and communication protocols for medical images and associated data, such as patient information and imaging parameters. A DICOM file can contain anything from an MRI scan to the details about the equipment used during imaging.

What sets DICOM apart is its focus on interoperability. It ensures that devices and systems from different vendors can seamlessly exchange and interpret imaging data, making it a cornerstone of modern medical imaging infrastructure.

Blog image

 

 

Exposure of PACS and DICOM

As of April 2025, numerous PACS servers and DICOM nodes were found to be accessible online, making them vulnerable to cyber threats. This internet exposure can lead to unauthorized access to sensitive patient records and medical images, potentially compromising patient privacy and healthcare integrity.

Blog image

Internet-Exposed PACS servers

Blog image

Internet-Exposed DICOM nodes

 

Newly Found Vulnerabilities

MedDream PACS Servers

MedDream PACS servers, known for their cross-platform compatibility and web-based viewing capabilities, are affected by several critical vulnerabilities:

These vulnerabilities allow attackers to execute arbitrary code, potentially gaining control over the PACS server and accessing sensitive medical data.

 

Sante PACS Servers

Sante PACS servers, which support full DICOM functionality and web-based viewing, have been found with several vulnerabilities:

These vulnerabilities can lead to arbitrary file writes and denial-of-service attacks, compromising the security and availability of medical data.

 

Osirix PACS Servers

Osirix PACS servers, exclusive to macOS, have been identified with several vulnerabilities:

These vulnerabilities can be exploited to disrupt the functionality of PACS servers, leading to denial-of-service attacks and potential data breaches.

 

Mitigations

To protect against these vulnerabilities, healthcare providers should implement the following measures:

  • Use Firewalls and VPNs: Place PACS servers behind firewalls and require VPNs for remote access. Restrict incoming DICOM communication and enforce TLS encryption.
  • Update and Patch Systems: Regularly update PACS servers with the latest security patches to protect against known vulnerabilities.
  • Access Control: Ensure that only authorized personnel can access and modify DICOM files. Implement role-based access control (RBAC), multi-factor authentication (MFA), and strong password policies.
  • Continuous Monitoring: Monitor PACS servers for unusual activity or potential security breaches. Utilize audit logs, user activity tracking, and network traffic analysis.
  • Educate Staff: Train healthcare and IT staff on the importance of PACS security and the risks associated with exposed servers and DICOM files. Promote awareness of phishing attempts and secure access practices.

All products from TXOne Networks incorporate the updated signature rules for these vulnerabilities to protect your devices from potential attacks. We have also listed the rules below:

These signatures help detect and block exploitation attempts, ensuring robust security for healthcare environments.

 

Conclusion

The discovery of vulnerabilities in PACS and DICOM systems highlights the urgent need for enhanced cybersecurity in healthcare. By proactively addressing these risks and implementing comprehensive security measures, healthcare providers can protect patient data and maintain the integrity of their imaging infrastructure.

 

Reference

Cybersecurity & Infrastructure Security Agency. (2025, May 8). ICS Medical Advisory | ICSMA-25-128-01: Pixmeo OsiriX MD. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-128-01

Tags

critical infrastructurehealthcare industrynew CVEsnew vulnerabilitiesthreat research
Share: