Vulnerabilities Identified in Pixmeo OsiriX MD DICOM Viewer
Three vulnerabilities have been identified in Pixmeo OsiriX MD, the most widely used DICOM medical image viewing software in the world, including a critical remotely exploitable flaw that could result in credential theft.
The most serious vulnerability is due to credentials being transmitted in cleartext by the Osirix MD Web Portal. The lack of encryption for the transmitted credentials means they could be intercepted by a threat actor. The vulnerability is tracked as CVE-2025-27720 and has a CVSS v4 severity score of 9.3 (CVSS v3.1: 7.4).
A high-severity use-after-free vulnerability has been identified that could be exploited by an attacker by uploading a specially crafted DICOM file. Successful exploitation of the vulnerability would cause memory corruption, resulting in a denial-of-service condition. The vulnerability is tracked as CVE-2025-27578 and has a CVSS v4 base score of 8.7 (CVSS v3.1: 7.5).
The third flaw is a medium-severity vulnerability that could be exploited by a threat actor to cause memory corruption or a system crash. The use-after-free vulnerability could be exploited by an attacker by locally importing a specially crafted DICOM file. The vulnerability is tracked as CVE-2025-31946 and has been assigned a CVSS v4 base score of 6.9 (CVSS v.3.1 6.2).
Get The FREE
HIPAA Compliance Checklist
Immediate Delivery of Checklist Link To Your Email Address
Please Enter Correct Email Address
Your Privacy Respected
HIPAA Journal Privacy Policy
The vulnerabilities were identified by Chizuru Toyama of TXOne Networks and Canaan Kao of TXOne Networks, who reported them to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). All three of the vulnerabilities affect OsiriX MD: Versions 14.0.1 (Build 2024-02-28) and prior versions, and have been fixed in the latest version of the software. While there have been no known cases of exploitation of the vulnerabilities in the wild, users should ensure they update all instances of Pixmeo OsiriX MD to the latest version to prevent exploitation.
To prevent the exploitation of vulnerabilities, Pixmeo OsiriX MD should not be accessible from the Internet and located behind a firewall and separated from business networks. If remote access is necessary, a secure method of access should be used, such as a Virtual Private Network (VPN), and physical controls should be in place to restrict access to authorized individuals only.


