{"id":"CVE-2025-53618","details":"An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `grayscale_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data","modified":"2026-04-10T05:30:52.638725Z","published":"2025-12-16T22:15:47.670Z","references":[{"type":"ADVISORY","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2025-2210"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/malaterre/gdcm","events":[{"introduced":"0"},{"last_affected":"2eaae2091ed90566597c34886dd17d639c1ba8d5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0.24"}]}}],"versions":["v2.0.12","v2.0.16","v2.0.17","v2.0.18","v2.0.4","v2.0.5","v2.0.7","v3.0.0","v3.0.1","v3.0.10","v3.0.11","v3.0.12","v3.0.13","v3.0.14","v3.0.15","v3.0.16","v3.0.17","v3.0.18","v3.0.19","v3.0.2","v3.0.20","v3.0.21","v3.0.22","v3.0.23","v3.0.24","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.0.7","v3.0.8","v3.0.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53618.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}