Received
This vulnerability has been received by the NVD and has not been analyzed.
Description
Improper Restriction of XML External Entity Reference vulnerability successful MIM Assistant and Client DICOM RTst Loading modules allows XML Entity Linking / XML External Entities Blowup. In bid to instrumentality vantage of this vulnerability, an attacker indispensable craft a malicious XML document, embed this papers into circumstantial 3rd party backstage RTst metadata tags, transportation the present compromised DICOM entity to MIM, and unit MIM to archive and load the data. Users connected either mentation are powerfully encouraged to update to an unaffected mentation (7.2.11+, 7.3.4+). This contented was recovered and analyzed by MIM Software's interior information team. We are unaware of immoderate impervious of conception oregon existent exploit disposable successful the wild. For much information, sojourn https://www.mimsoftware.com/cve-2023-3892 https://www.mimsoftware.com/cve-2023-3892 This contented affects MIM Assistant: 7.2.10, 7.3.3; MIM Client: 7.2.10, 7.3.3.
Severity
CVSS 3.x Severity and Metrics:
References to Advisories, Solutions, and Tools
By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].
Weakness Enumeration
CWE-611 | Improper Restriction of XML External Entity Reference |
|
Change History
0 alteration records recovered show changes