CVE-2023-3892
Unsafe XML parsing of 3rd party DICOM private tags may lead to XXE
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Improper Restriction of XML External Entity Reference vulnerability in MIM Assistant and Client DICOM RTst Loading modules allows XML Entity Linking / XML External Entities Blowup. In order to take advantage of this vulnerability, an attacker must craft a malicious XML document, embed this document into specific 3rd party private RTst metadata tags, transfer the now compromised DICOM object to MIM, and force MIM to archive and load the data. Users on either version are strongly encouraged to update to an unaffected version (7.2.11+, 7.3.4+). This issue was found and analyzed by MIM Software's internal security team. We are unaware of any proof of concept or actual exploit available in the wild. For more information, visit https://www.mimsoftware.com/cve-2023-3892 https://www.mimsoftware.com/cve-2023-3892 This issue affects MIM Assistant: 7.2.10, 7.3.3; MIM Client: 7.2.10, 7.3.3.
Vulnerabilidad de Restricción Inadecuada en XML External Entity Reference en los módulos MIM Assistant and Client DICOM RTst Loading que permiten XML Entity Linking / XML External Entities Blowup. Para aprovechar esta vulnerabilidad, un atacante debe crear un documento XML malicioso, incrustar este documento en etiquetas de metadatos RTst privadas de terceros específicas, transferir el objeto DICOM ahora comprometido a MIM y obligar a MIM a archivar y cargar los datos. Se recomienda encarecidamente a los usuarios de cualquiera de las versiones que actualicen a una versión no afectada (7.2.11+, 7.3.4+). Este problema fue encontrado y analizado por el equipo de seguridad interna de MIM Software. No conocemos ninguna prueba de concepto o exploit real disponible en el mercado. Para obtener más información, visite https://www.mimsoftware.com/cve-2023-3892 https://www.mimsoftware.com/cve-2023-3892 Este problema afecta a MIM Assistant: 7.2.10, 7.3.3; Cliente MIM: 7.2.10, 7.3.3.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-07-24 CVE Reserved
- 2023-09-19 CVE Published
- 2024-09-25 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
- CAPEC-201: Serialized Data External Linking
- CAPEC-221: Data Serialization External Entities Blowup
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.mimsoftware.com/cve-2023-3892 | 2023-09-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mimsoftware Search vendor "Mimsoftware" | Assistant Search vendor "Mimsoftware" for product "Assistant" | 7.2.10 Search vendor "Mimsoftware" for product "Assistant" and version "7.2.10" | - |
Affected
| ||||||
Mimsoftware Search vendor "Mimsoftware" | Assistant Search vendor "Mimsoftware" for product "Assistant" | 7.3.3 Search vendor "Mimsoftware" for product "Assistant" and version "7.3.3" | - |
Affected
| ||||||
Mimsoftware Search vendor "Mimsoftware" | Client Search vendor "Mimsoftware" for product "Client" | 7.2.10 Search vendor "Mimsoftware" for product "Client" and version "7.2.10" | - |
Affected
| ||||||
Mimsoftware Search vendor "Mimsoftware" | Client Search vendor "Mimsoftware" for product "Client" | 7.3.3 Search vendor "Mimsoftware" for product "Client" and version "7.3.3" | - |
Affected
|