News

Dangerous vulnerabilities detected in medical equipment from Becton, Dickinson and Company

CyberMDX security researchers discovered vulnerabilities in Becton, Dickinson and Company medical equipment, potentially allowing attackers to harm patients.

According to the researchers, two vulnerabilities in infusion pumps Alaris Gateway Workstation manufactured by Becton, Dickinson and Company allow an attacker to disable the device, infect it with malware or modify indicators.

“In emergency cases, attacker can even interact directly with the pumps and change the dosage of the drug and the rate of infusion,” – said the researchers.

The most dangerous of the two vulnerabilities affects the firmware of the workstation and allows completely disable the equipment, turning it into a useless “brick”. To restore the workstation, it will have to be sent to the manufacturer.

A less dangerous vulnerability allows an attacker to change the network configuration settings of the workstation and monitor the status of the pump.

Becton, Dickinson and Company released firmware updates that fix both vulnerabilities.

Infusion pump – medical equipment designed for long-term, metered, controlled injection of solutions, highly active drugs, nutrients to the patient. As a rule, infusion pumps are used for intravenous fluids.

The National Cybersecurity & Communications Integration Center (NCCIC) recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities.

Specifically, users should:

  • Minimize network exposure for all medical devices and/or systems.
  • Locate medical devices behind firewalls and isolate them where possible.
  • Restrict system access to authorized personnel only and follow a least privilege approach.
  • Apply defense-in-depth strategies.
  • Disable any unnecessary accounts, protocols and services.

NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

Source: https://ics-cert.us-cert.gov

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Remove Watch-video.net pop-up ads (Virus Removal Guide)

Watch-video.net is a domain that tries to trick you into clik to its browser notifications…

1 hour ago

Paaa Virus Removal Guide (+Decrypt .paaa files)

Paaa - General Info Paaa is a harmful software application working as typical ransomware. Michael…

9 hours ago

Vepi Virus Removal Guide (+Decrypt .vepi files)

Vepi Virus - Details Vepi is a harmful software application functioning as common ransomware. Michael…

9 hours ago

Vehu Virus Removal Guide (+Decrypt .vehu files)

Vehu - Ransomware Vehu is a destructive software application working as typical ransomware. Michael Gillespie,…

9 hours ago

Veza Virus Removal Guide (+Decrypt .veza files)

Veza - General Info Veza is a harmful software functioning as common ransomware. Michael Gillespie,…

9 hours ago

Remove Adblocker-downloading pop-up ads (Virus Removal Guide)

Adblocker-downloading.com is a domain that tries to trick you into subscribing to its browser notifications…

2 days ago