FDA Warns Medical Device Manufacturers of “Urgent” Cybersecurity Flaws

FDA Warns Medical Device Manufacturers of “Urgent” Cybersecurity Flaws

Security researchers found 11 significant vulnerabilities in devices that use the IPnet software, though there are no confirmed incidents involving takeovers of the devices.

After security researchers discovered key flaws in the cybersecurity protections of medical devices, federal officials sent out an official warning about the risks to patients and health care providers on Tuesday. 

The U.S. Food and Drug Administration and Department of Homeland Security released an “urgent” advisory about 11 security flaws, called “URGENT/11,” which rest within the software IPnet. The software, owned by Wind River Systems, is licensed to operating system developers who use IPnet on a wide variety of medical devices. 

While IPnet may not be supported with security updates by the original vendor, some manufacturers have a license that allows them to use it without support, according to the FDA. That has allowed the software to be incorporated into equipment and other systems that are used in medical and industrial devices today. 

“These vulnerabilities may allow anyone to remotely take control of the medical device and change its function, cause denial of service, or cause information leaks or logical flaws, which may prevent device function,” the FDA said in the advisory. 

The agency said it is not aware of any confirmed incidents involving the vulnerabilities, but that there is already publicly available software that allows hackers to take advantage of them. 

Some versions of the following operating systems may be affected by the issues: VxWorks, Operating System Embedded, INTEGRITY, ThreadX, ITRON and ZebOS. The vulnerable IPnet software component may not be included in all versions of those systems, the FDA said. 

In response to the vulnerabilities, some medical device manufacturers are taking action to determine which devices are affected and how they can remediate the cybersecurity issues. Several of those manufacturers have notified customers about the devices that have been identified as insecure, which include an imaging system, an infusion pump and an anesthesia machine. 

While the FDA did not name specific manufacturers or medical devices, the agency did say that it expects more to be identified in the coming months. Microsoft said that its ThreadX product no longer includes IPnet but earlier versions might have included the software. 

“We’ve investigated these reports and confirmed that these vulnerabilities do not impact any ThreadX release,” a Microsoft spokeswoman said via email.

In its advisory, the FDA advised manufacturers to conduct thorough risk assessments of their products and develop a plan for updating devices.

“The FDA will continue to assess new information concerning the URGENT/11 vulnerabilities and will keep the public informed if significant new information becomes available,” the agency said.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3