CVE-2024-42845
Linux Debian vulnerability analysis and mitigation

Overview

An eval Injection vulnerability (CVE-2024-42845) was discovered in the component invesalius/reader/dicom.py of InVesalius, affecting versions 3.1.99991 through 3.1.99998. The vulnerability allows attackers to execute arbitrary code via loading a crafted DICOM file. InVesalius is an open-source biomedical tool used worldwide for 3D medical imaging reconstruction based on DICOM files (NVD, Cybersecurity News).

Technical details

The vulnerability is associated with the GetImagePosition() function that processes the DICOM standard tag (0x0020, 0x0032), which contains coordinates of the upper left-corner voxel of an image. The issue stems from the unsafe use of Python's eval() function on data extracted from DICOM files. The function processes image position values split by backslashes, where each value is evaluated using eval(), allowing for potential code execution. The vulnerability has received a CVSS 3.1 Base Score of 8.0 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H (NVD, Partywave Research).

Impact

The vulnerability could allow attackers to execute arbitrary code on systems running affected versions of InVesalius. Given that InVesalius is used in medical facilities worldwide for processing and viewing medical imaging data, successful exploitation could potentially compromise sensitive medical information and system integrity (Cybersecurity News).

Mitigation and workarounds

Users of affected versions should update to the latest version of InVesalius when available. The vulnerability affects versions 3.1.99991 through 3.1.99998, and organizations should implement proper input validation techniques to prevent similar vulnerabilities (NVD).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22857MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp-plugins
NoNoJan 14, 2026
CVE-2026-22856MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp2
NoNoJan 14, 2026
CVE-2026-22859MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22858MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management