Friday, September 9, 2022
HomeNetworkingMedical system vulnerability may let hackers steal Wi-Fi credentials

Medical system vulnerability may let hackers steal Wi-Fi credentials


A vulnerability present in an interplay between a Wi-Fi-enabled battery system and an infusion pump for the supply of medicine may present dangerous actors with a technique for stealing entry to Wi-Fi networks utilized by healthcare organizations, in response to Boston-based safety agency Rapid7.

Essentially the most severe concern entails Baxter Worldwide’s SIGMA Spectrum infusion pump and its related Wi-Fi battery system, Rapid7 reported this week. The assault requires bodily entry to the infusion pump. The basis of the issue is that the Spectrum battery models retailer Wi-Fi credential info on the system in non-volatile reminiscence, which signifies that a foul actor may merely buy a battery unit, join it to the infusion pump, and quicky flip it on and off once more to drive the infusion pump to jot down Wi-Fi credentials to the battery’s reminiscence.

Batteries can comprise Wi-Fi credentials

Rapid7 added that the vulnerability carries the extra danger that discarded or resold batteries may be acquired to be able to harvest Wi-Fi credentials from the unique group, if that group hadn’t been cautious about wiping the batteries down earlier than eliminating them.

The safety agency additionally warned of further vulnerabilities, together with a telnet concern involving the “hostmessage” command which might be exploited to view knowledge from the related system’s course of stack, and the same format string vulnerability that might be used to learn or write to reminiscence on the system, or create a denial-of-service (DoS) assault.

Lastly, Rapid7 mentioned, the battery models examined had been additionally susceptible to unauthenticated community reconfiguration assaults utilizing TCP/UDP protocols. An attacker sending a particular XML command to a particular port on the system may change that system’s IP deal with, creating the potential for man-in-the-middle assaults.

The remediation for the primary vulnerability, in response to the safety firm, is solely to regulate bodily entry to the gadgets extra rigorously, because it can’t be exploited with out manually connecting the battery to the infusion pump, and to rigorously purge Wi-Fi info—by connecting the susceptible batteries to a unit with invalid or clean —earlier than reselling or in any other case disposing of the gadgets.

For the telnet and TCP/UDP vulnerabilities, the answer is cautious monitoring of community visitors for any uncommon hosts connecting to the susceptible port—51243—on the gadgets, and proscribing entry to community segments containing the infusion pumps. Baxter has additionally issued new software program updates, which disable Telnet and FTP for the susceptible gadgets.

Correct decommissioning is vital to safety

Tod Beardsley, Rapid7’s director of analysis, mentioned that the discovering emphasizes the significance of correctly decomissioning tools that would maintain delicate knowledge, and that community managers have to pay attention to the potential menace posed by susceptible IoT gadgets.

“Due diligence is important to make sure that IoT gadgets don’t comprise extractable delicate info when they’re discontinued inside a selected group,” he mentioned. “Moreover, community segmentation have to be improved upon to collectively deal with IoT safety disconnects.”

Copyright © 2022 IDG Communications, Inc.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments