What can happen if a hospital patient monitor is hacked?



What can happen if a hospital patient monitor is hacked?

  1. Patient's medical information (#PHI) is exposed to the external.
  2. Since the monitor alarm is disabled, medical staff are not notified of emergency situations such as cardiac arrest or respiratory failure, so patients miss the golden time.
  3. Unauthorized modification of vital body parameters (heart rate, blood pressure, oxygen level, etc.) data can lead to misdiagnosis and incorrect treatment, and emergency surgeries are delayed.


"Ultimately, it threatens the lives of patients."

However, is it actually possible to hack these patient monitors that can be easily found in hospitals? Yes, it is definitely possible.


On Jan 30, regarding the 'Contec #CMS8000' patient monitor mentioned in the announcement by CISA and FDA, the #Team82 research team found a vulnerable design of the device and shared an attack PoC that exploited the flaw as follows. 


[Summary of Attack PoC]

Download malicious binary and overwrite executable to patient monitor file system with hardcoded IP address > Implement reverse shell payload with control code call and arbitrary code execution and remote shell access

More details: https://lnkd.in/gBYPGYvb


Here are the recommendations for organizations using 'Contec CMS8000' patient monitor:

  1. Block all access to subnet 2_0_2.1_1_4.4.x/24 from internal network
  2. Avoid using hardcoded default IP address (2_0_2.1_1_4.4.1_1_9) for CMS and if unavoidable, prevent external routing of traffic through static routes or network segmentation
  3. Block outbound traffic to 2_0_2.1_1_4.4.1_2_0 to prevent PII/PHI leakage if 'HL7' feature is not used.

#CPS #OT #XIoT #IoT #IIoT #IoMT #CPSSecurity #OTSecurity #IoTSecurity #CPS보안 #OT보안 #IoT보안

Comments

Popular posts from this blog

Don't confuse DCS, PLC and SCADA in front of OT specialists

Top 20 Threat Scenarios & Playbooks for OT Security

Let's create our own ICS Labs in the VMs!