A number of vulnerabilities have been discovered in Phoenix Contact industrial solutions that allow unauthorized…
“In emergency cases, attacker can even interact directly with the pumps and change the dosage of the drug and the rate of infusion,” – said the researchers.
The most dangerous of the two vulnerabilities affects the firmware of the workstation and allows completely disable the equipment, turning it into a useless “brick”. To restore the workstation, it will have to be sent to the manufacturer.
A less dangerous vulnerability allows an attacker to change the network configuration settings of the workstation and monitor the status of the pump.
Becton, Dickinson and Company released firmware updates that fix both vulnerabilities.
Infusion pump – medical equipment designed for long-term, metered, controlled injection of solutions, highly active drugs, nutrients to the patient. As a rule, infusion pumps are used for intravenous fluids.
Specifically, users should:
NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Source: https://ics-cert.us-cert.gov
Watch-video.net is a domain that tries to trick you into clik to its browser notifications…
Paaa - General Info Paaa is a harmful software application working as typical ransomware. Michael…
Vepi Virus - Details Vepi is a harmful software application functioning as common ransomware. Michael…
Vehu - Ransomware Vehu is a destructive software application working as typical ransomware. Michael Gillespie,…
Veza - General Info Veza is a harmful software functioning as common ransomware. Michael Gillespie,…
Adblocker-downloading.com is a domain that tries to trick you into subscribing to its browser notifications…