Endpoint Security , Governance & Risk Management , Healthcare

2 Tales of Device-Related Risks to Patients

Medtronic Device Alerts Issued; Researchers Find Millions of Exposed Medical Images
2 Tales of Device-Related Risks to Patients
The Medtronic MyCareLink Smart 25000 Patient Reader is the subject of recent security alerts from the vendor and DHS.

Recent disclosures about security issues pertaining to certain medical devices as well as storage devices used in healthcare serve as reminders of the potential risks to patients that must be mitigated.

See Also: Live Webinar | Navigating the Difficulties of Patching OT

Those disclosures include alerts about vulnerabilities identified by researchers in a Medtronic product used by cardiac patients and a report about millions of unsecured medical images containing patient identifying information found exposed on the internet.

Medtronic Alerts

On Monday, the Cybersecurity and Infrastructure Security Agency and medical device maker Medtronic issued alerts about vulnerabilities in the Medtronic MyCareLink Smart 25000 Patient Reader product used by some patients with cardiac devices, such as pacemakers, to communicate with their doctors in between office visits.

If exploited, the vulnerabilities – including improper authentication, heap-based buffer overflow, and Time-of-check Time-of-use Race Condition – could allow an unauthorized individual to modify or fabricate data, allowing the attacker to control a cardiac device, CISA says in its alert.

So far, CISA notes, there are no known exploits targeting these vulnerabilities. And the flaws are not remotely exploitable.

Medtronic reports that it does not know of any related cyberattacks or unauthorized access to patient data or of any patient who has been harmed as a result of the vulnerabilities.

The Medtronic vulnerabilities were identified by two groups of researchers: a team at Tel Aviv, Israel-based Sternum and a team from the University of California, Santa Barbara; the University of Florida and the University of Michigan.

Patient Risks

So, how serious are the Medtronic issues in terms of potential data security and patient safety risks?

“This exploitation requires deep engineering knowledge of the device, and physical proximity to extract the pacemaker’s data,” says a statement provided to Information Security Media Group by researchers Sara Rampazzi and Kevin Fu of the University of Michigan’s Archimedes Center for Medical Device Security and the research team at the University of California, Santa Barbara.

“Furthermore, the collected data that can include personal information and highly-technical cardiac data, needs to be interpreted by a doctor. Thus, we expect the risk to the patient overall to be low.”

Medtronic says a firmware update will eliminate the identified vulnerabilities. It’s available by updating the MyCareLink Smart app via the associated mobile application store. “Upgrading to the latest v5.2 mobile application version will ensure the Patient Reader is also updated on next use. The user’s smart phone must be updated to the following operating system version for the patches to be applied: iOS 10 and above; Android 6.0 and above,” Medtronic notes.

Common Issues?

Many flawed medical devices can be vulnerable to intrusion if they’re not adequately protected, the University of Michigan and University of California researchers tell ISMG.

“Preventing hackers from disabling or taking control of electronic devices is an ongoing challenge because malicious actors tend to be steps ahead of researchers and manufacturers,” they say in the statement. “Our goal as researchers is to develop techniques to incorporate security properties early in the design phase of a product to prevent potential future vulnerabilities.”

Elad Luz, who also has previously identified a variety of vulnerabilities in CybelAngel in a new report said they have detected more than 45 million unique medical images accessible on the internet via about 2,000 unprotected connected storage devices with ties to medical centers, hospitals, clinics and doctors’ offices – large and small - in 67 countries.

In most cases, the identified leaking device was a network-attached storage solution, or NAS, the report notes. Exposed images include patient X-rays and CT scans containing information such as patients’ identities and health information.

CybelAngel researchers say they've identified 45 million unsecured medical images.

A NAS generally uses the FTP or SMB protocol and serves as a web access to connect to the device, the report states. “This web access is password-protected, but these devices may have security flaws that enable guest access through a file-sharing protocol. Sometimes the operating system itself may open a guest access on the distant device; this is a design feature that permits different systems to work together.”

Top Findings

The CybelAngel Analyst Team embarked on a study of medical data by examining Digital Imaging and Communications in Medicine, or DICOM, which is a protocol and an international image standard, the report notes.

The six-month study by CybelAngel found:

  • Encryption and other security features are typically not enabled for images stored and exchanged as DICOM files;
  • Misconfigured NAS devices are a major root cause of exposure, leaving DICOM caches exposed;
  • Third-party vendors are often involved with the exposures.

The CybelAngel report notes that, in one case, researchers found that “a paid service advertising ‘secure’ DICOM image handling was, itself, running on unprotected infrastructure and CybelAngel detected malicious code already running on the service provider’s servers.”

Other top causes for these data leaks include failure to change a device default password at time of implementation and allowing "guest" access versus secure password protection, David Sygula, senior cybersecurity analyst at CybelAngel, tells ISMG.

“CybelAngel scanned and detected those medical files that were publicly accessible - servers that were open without restricted access. If someone were to use the default/manufacturer's password, we believe the number of exposed images could easily be as much as eight to 10 times greater,” he notes.

Metadata Files

The risks the leaked medical images pose to patients depend on what metadata is attached to these files. Certain data could be used for identity theft and fraud, he says.

Other researchers have also previously identified and warned of exposed medical images on the internet.

For example, in August, the American College of Radiology, the Radiological Society of North America and the Society for Imaging Informatics in Medicine, issued a joint warning that patient identifiers embedded in medical images used for online presentations are at risk of inadvertent discovery by advanced web-crawling technologies in search engines (see: 2.3 Billion Files Exposed Online: The Root Causes).

Steps to Take

To prevent medical images from being exposed on the internet, entities can take a number of measures, Sygula says.

“They should change the default password at time of implementation, enforce strong secure password practices and protections, implement DICOM's encryption and other existing, out-of-the-box security measures and conduct regular server maintenance and patching,” he says.

Also, exhaustive scanning of open databases, connected storage and cloud apps can alert organizations to data leaks, he says.

“This empowers them to address leaks of sensitive and confidential data before it is breached.”

About the Author

Marianne Kolbasuk McGee

Marianne Kolbasuk McGee

Executive Editor, HealthcareInfoSecurity, ISMG

McGee is executive editor of Information Security Media Group's HealthcareInfoSecurity.com media site. She has about 30 years of IT journalism experience, with a focus on healthcare information technology issues for more than 15 years. Before joining ISMG in 2012, she was a reporter at InformationWeek magazine and news site and played a lead role in the launch of InformationWeek's healthcare IT media site.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.