Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 4, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 4, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 4, 2025

      Smashing Animations Part 4: Optimising SVGs

      June 4, 2025

      I test AI tools for a living. Here are 3 image generators I actually use and how

      June 4, 2025

      The world’s smallest 65W USB-C charger is my latest travel essential

      June 4, 2025

      This Spotlight alternative for Mac is my secret weapon for AI-powered search

      June 4, 2025

      Tech prophet Mary Meeker just dropped a massive report on AI trends – here’s your TL;DR

      June 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025
      Recent

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025

      Simplify Negative Relation Queries with Laravel’s whereDoesntHaveRelation Methods

      June 4, 2025

      Cast Model Properties to a Uri Instance in 12.17

      June 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025
      Recent

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025

      Rilasciata /e/OS 3.0: Nuova Vita per Android Senza Google, Più Privacy e Controllo per l’Utente

      June 4, 2025

      Rilasciata Oracle Linux 9.6: Scopri le Novità e i Miglioramenti nella Sicurezza e nelle Prestazioni

      June 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Improper Certificate Validation in RadiAnt DICOM Viewer Puts Healthcare Systems at Risk

    Improper Certificate Validation in RadiAnt DICOM Viewer Puts Healthcare Systems at Risk

    February 21, 2025

    RadiAnt DICOM Viewer

    A newly identified cybersecurity vulnerability in Medixant’s RadiAnt DICOM Viewer has raised concerns about potential security threats in the healthcare sector. The vulnerability tracked as CVE-2025-1001, is linked to improper certificate validation, which could allow attackers to deliver malicious updates to users. The Cybersecurity and Infrastructure Security Agency (CISA) has released an advisory detailing the risks, affected products, and mitigation steps.

    RadiAnt DICOM Viewer Vulnerability Overview

    The vulnerability exists in RadiAnt DICOM Viewer (Version 2024.02) due to improper certificate validation (CWE-295). This flaw arises from the failure of the update mechanism to verify the authenticity of the update server’s certificate. If exploited, this vulnerability could enable a machine-in-the-middle (MITM) attack, allowing an attacker to manipulate network traffic and deliver a malicious update to unsuspecting users.

    CVSS Score and Risk Level

    The vulnerability has been assigned a CVSS v3.1 base score of 5.7, indicating a medium-level risk. The CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).

    A CVSS v4 score of 5.7 has also been calculated, with the vector string (AV:A/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N).

    Although the attack complexity is low, exploitation requires user interaction, meaning an attacker would need to trick a user into initiating an update process.

    Affected Products

    The vulnerability specifically affects:

    • RadiAnt DICOM Viewer: Version 2024.02

    Potential Impact on Healthcare and Public Health Sectors

    Medixant’s RadiAnt DICOM Viewer is widely used in the healthcare and public health sectors globally. Any security weakness in this software poses significant risks, as attackers could manipulate updates to inject malicious code into healthcare systems, potentially compromising patient data integrity and system security.

    Hostinger

    The vulnerability was identified and reported by Sharon Brizinov of Claroty Team82 to CISA. Following responsible disclosure practices, CISA has now issued an advisory to alert organizations using the affected software.

    Mitigation Measures

    To address this vulnerability, Medixant has released an updated version of RadiAnt DICOM Viewer (v2025.1) and strongly recommends users upgrade to this version as soon as possible.

    For users unable to immediately upgrade, Medixant has provided the following temporary mitigation measures:

    1. Disable update notifications by running the following command:
      reg add "HKCUSoftwareRadiAnt Viewer" /t REG_DWORD /v CheckUpdate /d 0 /f
    2. Avoid manual update checks: Users should refrain from clicking “Check for updates now” in the toolbar menu.
    3. Download updates only from the official website: Users should manually download the latest version from RadiAnt Viewer’s official website.
    4. Verify downloaded files with antivirus software before installation to ensure they are not tampered with.

    CISA’s Security Recommendations

    In addition to Medixant’s mitigation measures, CISA has issued broader cybersecurity best practices to minimize the risk of exploitation:

    • Restrict network exposure: Ensure control system devices are not accessible from the internet.
    • Use firewalls: Secure control system networks and isolate them from business networks.
    • Secure remote access: If remote access is required, use Virtual Private Networks (VPNs). However, organizations should ensure VPNs are updated and recognize that their security is only as strong as the devices connected to them.
    • Perform risk assessments: Conduct thorough impact analysis and security assessments before implementing defensive measures.

    Guidance on Avoiding Social Engineering Attacks

    As attackers often use social engineering tactics to exploit vulnerabilities, CISA recommends users adopt the following security measures:

    • Avoid clicking on unsolicited email links or attachments.
    • Familiarize with common phishing tactics by referring to resources like “Recognizing and Avoiding Email Scams.”
    • Educate users on social engineering threats using materials such as “Avoiding Social Engineering and Phishing Attacks.”

    Final Thoughts

    Cybersecurity threats in healthcare continue to evolve, and vulnerabilities like CVE-2025-1001 highlight the need for proactive security measures. How well is your organization prepared to handle emerging cybersecurity threats? Have you evaluated whether your update mechanisms are fully secure? Staying ahead of vulnerabilities requires constant vigilance, strong security practices, and a commitment to implementing the latest software updates.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks
    Next Article Linux Memory Management: Understanding Page Tables, Swapping, and Memory Allocation

    Related Posts

    Security

    HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability — Urges Immediate Patch Upgrade

    June 4, 2025
    Security

    Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)

    June 4, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Microsoft CEO Satya Nadella weighs in on the $500 billion Stargate project, seemingly dismissing Elon Musk’s liquidity concerns: “All I know is, I’m good for my $80 billion.”

    News & Updates

    The 12 best Black Friday Dell deals 2024: Early sales available now

    Development

    Refine – tweak various aspects of GNOME

    Linux

    Revisiting CSS Multi-Column Layout

    News & Updates

    Highlights

    Development

    Meta Exposes Iranian Hacker Group Targeting Global Political Figures on WhatsApp

    August 29, 2024

    Meta Platforms on Friday became the latest company after Microsoft, Google, and OpenAI to expose…

    CVE-2025-0716 – AngularJS SVG Image Content Spoofing

    April 29, 2025

    The best Black Friday VPN deals 2024: Early sales live now

    November 1, 2024

    Ocular – A minimalistic, modern, self-hostable budgeting app

    November 3, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.