Introduction
Healthcare organizations rely heavily on the seamless availability of medical imaging systems. A critical vulnerability recently identified in the Grassroots DICOM (GDCM) library poses a significant threat to this availability. Tracked as CVE-2026-3650, this security issue could allow an attacker to crash medical imaging applications simply by sending a specially crafted file.
For defenders, understanding the mechanics of this vulnerability is essential to preventing Denial-of-Service (DoS) conditions that could disrupt patient care. This post breaks down the vulnerability and provides actionable steps to identify vulnerable systems and remediate the risk.
Technical Analysis
CVE ID: CVE-2026-3650 CVSS v3 Score: 7.5 (High) Affected Vendor: Grassroots DICOM Affected Product: Grassroots DICOM (GDCM) Library Affected Version: 3.2.2
The Vulnerability: The vulnerability is a memory leak that occurs within the GDCM library. Specifically, the bug is triggered when the library parses malformed DICOM files that contain non-standard Value Representation (VR) types in their file meta information.
Impact: When an application using the vulnerable version of GDCM processes a malicious file, it fails to release memory after it is no longer needed. Over time, or with rapid repeated processing, this memory exhaustion leads to a crash or a complete halt of the application—a Denial-of-Service (DoS) condition. Given the Healthcare and Public Health sector's reliance on DICOM for imaging (X-rays, MRIs, CTs), this vulnerability creates a high risk for operational disruption.
Defensive Monitoring and Detection
Because GDCM is a library embedded within larger medical software applications (PACS, viewers, etc.), it cannot be detected via a simple network port scan. Defenders must scan the file systems of servers and workstations to identify the presence of the vulnerable DLL or shared object.
The following PowerShell script helps security teams inventory their Windows environments to detect if the vulnerable gdcm.dll version 3.2.2 is present.
PowerShell Scanner for GDCM 3.2.2
<#
.SYNOPSIS
Scans for presence of GDCM gdcm.dll version 3.2.2 (CVE-2026-3650).
.DESCRIPTION
Recursively searches common program directories for gdcm.dll and checks version.
#>
$VulnerableVersion = "3.2.2"
$SearchPaths = @("C:\Program Files", "C:\Program Files (x86)", "C:\")
$Results = @()
Write-Host "[+] Starting scan for GDCM Library vulnerabilities..."
foreach ($Path in $SearchPaths) {
if (Test-Path $Path) {
Write-Host "[+] Scanning $Path..."
try {
$Files = Get-ChildItem -Path $Path -Filter "gdcm.dll" -Recurse -ErrorAction SilentlyContinue
foreach ($File in $Files) {
try {
$VersionInfo = $File.VersionInfo
$FileVersion = $VersionInfo.FileVersion
if ($FileVersion -eq $VulnerableVersion) {
$Results += [PSCustomObject]@{
ComputerName = $env:COMPUTERNAME
FilePath = $File.FullName
FileVersion = $FileVersion
Status = "VULNERABLE"
}
}
} catch {
# Ignore files where version info cannot be read
}
}
} catch {
Write-Host "[-] Error accessing $Path"
}
}
}
if ($Results.Count -gt 0) {
Write-Host "[!] ALERT: Vulnerable GDCM versions found!" -ForegroundColor Red
$Results | Format-Table -AutoSize
} else {
Write-Host "[+] No vulnerable GDCM 3.2.2 instances found." -ForegroundColor Green
}
Remediation
To protect your organization from CVE-2026-3650, IT and security teams should immediately undertake the following steps:
-
Update GDCM Library: The primary remediation is to update the Grassroots DICOM library to the latest version provided by the vendor. If your organization utilizes third-party medical software that relies on GDCM, contact the software vendor immediately to obtain a patch that includes the updated, non-vulnerable library.
-
Verify Software Dependencies: Work with your biomedical engineering and IT teams to inventory all software that handles DICOM images. Ensure that every application utilizing the GDCM library is verified for the patch status of its underlying dependencies.
-
Input Validation and Segmentation:
- Network Segmentation: Ensure that DICOM traffic and medical imaging workstations are isolated from the general internet and untrusted networks to reduce the attack surface.
- File Sanitization: Implement security controls that validate DICOM file headers and structure before they are processed by internal imaging libraries. Dropping malformed files at the network perimeter can prevent the exploit from reaching the vulnerable parser.
-
Monitor for DoS: Until patches are applied, increase monitoring on critical imaging servers for signs of memory exhaustion or unexpected application crashes, which may indicate an active exploitation attempt.
Related Resources
Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.