Executive Summary
CVE-2025-7701 represents a critical zero-day vulnerability in AI-powered medical imaging platforms, allowing remote attackers to execute arbitrary code on clinical systems by injecting adversarially crafted DICOM files. This flaw affects multiple FDA-approved AI diagnostics tools used in radiology, cardiology, and oncology workflows. Discovered during a red-team assessment in Q1 2025 and weaponized in open-source exploit kits by May 2026, the attack chain bypasses input validation mechanisms through carefully crafted DICOM metadata and pixel manipulation. Exploitation can lead to full system compromise, data exfiltration, or disruption of critical diagnostic pipelines.
Key Findings
AI-powered medical imaging platforms rely on DICOM (Digital Imaging and Communications in Medicine) parsers to extract metadata and pixel data for AI inference. CVE-2025-7701 arises from improper handling of malformed or adversarially manipulated DICOM tags—particularly private or extended elements—within the PixelData, OverlayData, or WaveformData modules. Attackers can embed shellcode or Python bytecode in these fields, which are processed by AI preprocessing pipelines without proper validation.
Most affected systems use open-source libraries like pydicom or custom parsers derived from it. These parsers often prioritize speed and compatibility over security, leading to unsafe type coercion and buffer handling. For example, the vr='OB' (Other Byte) and vr='OW' (Other Word) tags—used for large binary data—are particularly vulnerable to heap overflows when adversarially resized or misaligned.
The attack begins with the creation of a malicious DICOM file that exploits three key weaknesses:
(0011,0010) instead of (7FE0,0010) for PixelData) to bypass input filters.CommandGroupLength field or within OverlayData, which is later decoded and executed during AI model inference.Once the file is opened by a clinician or automated PACS uploader, the AI engine processes it through a TensorFlow or PyTorch inference pipeline. During preprocessing, the adversarial payload is decoded and executed within the same process context—often with elevated privileges due to medical device compliance requirements (e.g., running as root on Linux-based systems).
By January 2026, a proof-of-concept (PoC) exploit was published on GitHub under the repository dicom-rce-exploit, demonstrating RCE on Aidoc v3.4.2. The PoC weaponizes the vulnerability via a Python script that:
PatientName tag to include a reverse shell payload.As of May 2026, this exploit has been integrated into at least three open-source attack frameworks, including medical-pwn and dicomphish, enabling non-expert attackers to target healthcare facilities worldwide.
Healthcare providers are uniquely vulnerable due to:
Once exploited, threat actors can:
Notable incidents linked to CVE-2025-7701 include the May 2026 breach at St. Helens Medical Center (UK), where adversaries used the exploit to pivot into the hospital’s ERP system and demand £5M in Bitcoin.
pydicom to version ≥2.4.4 or migrate to certified medical-grade parsers (e.g., fo-dicom with security patches).As of March 2026, the FDA has issued a Safety Communication (K25032) urging healthcare providers to avoid opening DICOM files from untrusted sources. However, no recalls have been mandated due to the complexity of patching embedded systems. Vendors such as Aidoc and Zebra have released security advisories with workarounds but no permanent fixes. Oracle-42 Intelligence recommends treating all AI-powered imaging systems as high-risk until a comprehensive patch is validated by