Siemens Healthineers Security Advisories  

Privilege Escalation Vulnerability in Medicalis Workflow Orchestrator

Publication Date: 2024-07-08     
Last Update: 2024-07-08
Current Version: V 1.0
CVSS v3.1 Base Score: 7.8
CVSS v4.0 Base Score: 8.5


Medicalis Workflow Orchestrator contains a privilege escalation vulnerability that could allow a local attacker to escalate privileges.

Siemens Healthineers recommends countermeasures for products where fixes are not, or not yet available.

Affected Product and Versions


Medicalis Workflow Orchestrator
All versions
affected by CVE-2024-37999

Currently no fix is planned
Remove the 'Medicalis Workflow Orchestrator Client Updater Windows Service'


Currently no fix is planned
Remove the 'Medicalis Workflow Orchestrator Client Updater Windows Service'
Product specific remediations or mitigations can be found in the section Affected Products and Solution.

Please follow the General Security Recommendations.


In addition, Siemens Healthineers generelly recommends the following:

  • Ensure you have appropriate backups and system restoration procedures.
  • Securely delete any backup files that are no longer needed.
  • For specific patch and remediation guidance information contact your local Siemens Healthineers Customer Service Engineer, portal or our Regional Support Center. To find your local contact, please refer to


Medicalis Workflow Orchestrator (WFO) is an enterprise level software solution that manages radiologist reading workflow across radiology practices and legacy platforms.


This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.

Vulnerability CVE-2024-37999

The affected application executes as a trusted account with high privileges and network access. This could allow an authenticated local attacker to escalate privileges.

CVSS v3.1 Base Score:


CVSS v3.1 Vector:


CVSS v4.0 Base Score:


CVSS v4.0 Vector:



CWE-282: Improper Ownership Management


Siemens Healthineers thanks the following parties for their efforts:

  • Brett Gustafson from Evolve Security for coordinated disclosure


To eliminate the vulnerability, the Medicalis Workflow Orchestrator Client Updater Windows Service should be deleted. Doing so will not prevent client updates from happening, and has no impact to user workflows. The client will update when it is launched and manual updates can still be performed using the System Tray task application.

To delete the service from a client workstation and anywhere the client is installed:

Run Powershell as admin

Run the following from a command line:

net stop "Medicalis Workflow Orchestrator Client Updater"

And then:

sc delete "Medicalis Workflow Orchestrator Client Updater".

For further inquiries on security vulnerabilities in Siemens Healthineers products and solutions, please contact Siemens Healthineers using the following link:


V1.0 (2024-07-08): Publication Date


Siemens Healthineers Security Advisories are subject to the terms and conditions contained in Siemens’ Healthineers underlying license terms or other applicable agreements previously agreed to with Siemens Healthineers (hereinafter "License Terms"). To the extent applicable to information, software or docu- mentation made available in or through a Siemens Healthineers Security Advisory, the Terms of Use of Siemens’ Healthineers Global Website (, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.