// For flags

CVE-2023-3892

Unsafe XML parsing of 3rd party DICOM private tags may lead to XXE

Severity Score

7.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Improper Restriction of XML External Entity Reference vulnerability in MIM Assistant and Client DICOM RTst Loading modules allows XML Entity Linking / XML External Entities Blowup.




In order to take advantage of this vulnerability, an attacker must
craft a malicious XML document, embed this document into specific 3rd
party private RTst metadata tags, transfer the now compromised
DICOM object to MIM, and force MIM to archive and load the data.

Users on either version are strongly encouraged to update to an unaffected version (7.2.11+, 7.3.4+).

This issue was found and analyzed by MIM Software's internal security team.  We are unaware of any proof of concept or actual exploit available in the wild.


For more information, visit https://www.mimsoftware.com/cve-2023-3892 https://www.mimsoftware.com/cve-2023-3892




This issue affects MIM Assistant: 7.2.10, 7.3.3; MIM Client: 7.2.10, 7.3.3.

Vulnerabilidad de Restricción Inadecuada en XML External Entity Reference en los módulos MIM Assistant and Client DICOM RTst Loading que permiten XML Entity Linking / XML External Entities Blowup. Para aprovechar esta vulnerabilidad, un atacante debe crear un documento XML malicioso, incrustar este documento en etiquetas de metadatos RTst privadas de terceros específicas, transferir el objeto DICOM ahora comprometido a MIM y obligar a MIM a archivar y cargar los datos. Se recomienda encarecidamente a los usuarios de cualquiera de las versiones que actualicen a una versión no afectada (7.2.11+, 7.3.4+). Este problema fue encontrado y analizado por el equipo de seguridad interna de MIM Software. No conocemos ninguna prueba de concepto o exploit real disponible en el mercado. Para obtener más información, visite https://www.mimsoftware.com/cve-2023-3892 https://www.mimsoftware.com/cve-2023-3892 Este problema afecta a MIM Assistant: 7.2.10, 7.3.3; Cliente MIM: 7.2.10, 7.3.3.

*Credits: MIM Software
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-07-24 CVE Reserved
  • 2023-09-19 CVE Published
  • 2023-09-20 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
  • CAPEC-201: Serialized Data External Linking
  • CAPEC-221: Data Serialization External Entities Blowup
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mimsoftware
Search vendor "Mimsoftware"
Assistant
Search vendor "Mimsoftware" for product "Assistant"
7.2.10
Search vendor "Mimsoftware" for product "Assistant" and version "7.2.10"
-
Affected
Mimsoftware
Search vendor "Mimsoftware"
Assistant
Search vendor "Mimsoftware" for product "Assistant"
7.3.3
Search vendor "Mimsoftware" for product "Assistant" and version "7.3.3"
-
Affected
Mimsoftware
Search vendor "Mimsoftware"
Client
Search vendor "Mimsoftware" for product "Client"
7.2.10
Search vendor "Mimsoftware" for product "Client" and version "7.2.10"
-
Affected
Mimsoftware
Search vendor "Mimsoftware"
Client
Search vendor "Mimsoftware" for product "Client"
7.3.3
Search vendor "Mimsoftware" for product "Client" and version "7.3.3"
-
Affected