This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: InVesalius (v3.1.99991-3.1.99998) suffers from **Eval Injection** via DICOM files.β¦
π‘οΈ **Root Cause**: **Eval Injection**. The software fails to sanitize input when processing DICOM files, allowing code execution commands to be injected and evaluated by the application engine.
Q3Who is affected? (Versions/Components)
π₯ **Affected**: Users of **InVesalius 3.1.99991 through 3.1.99998**. This is an open-source 3D medical imaging reconstruction software. π₯οΈ Tested primarily on **Windows**.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: **Remote Code Execution (RCE)**. Hackers gain the same privileges as the user running InVesalius. They can run any command, install malware, or steal sensitive medical data. π
Q5Is exploitation threshold high? (Auth/Config)
π **Exploitation Threshold**: **Low**. No authentication is required. The attack vector is **Social Engineering**: simply getting the victim to open a crafted `.dcm` (DICOM) file is enough to trigger the exploit. π£
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Public Exploit**: **YES**. POCs and exploits are publicly available on GitHub (e.g., `partywavesec/invesalius3_vulnerabilities`). Wild exploitation is highly likely given the ease of delivery. β οΈ
Q7How to self-check? (Features/Scanning)
π **Self-Check**: 1. Check your InVesalius version (must be between 3.1.99991 and 3.1.99998). 2. Scan for suspicious DICOM files in your inbox. 3.β¦
π§ **No Patch Workaround**: **Do not open DICOM files** from untrusted sources. If you must use the vulnerable version, run it in a **sandboxed environment** or **VM** to isolate potential code execution. π
Q10Is it urgent? (Priority Suggestion)
π¨ **Urgency**: **CRITICAL**. High severity due to **RCE** and **easy exploitation** via file opening. Immediate patching or isolation is required for all medical professionals using this software. π₯