{"id":18453,"date":"2022-03-08T10:45:07","date_gmt":"2022-03-08T18:45:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/08\/news-12186\/"},"modified":"2022-03-08T10:45:07","modified_gmt":"2022-03-08T18:45:07","slug":"news-12186","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/08\/news-12186\/","title":{"rendered":"Critical Bugs Expose Hundreds of Thousands of Medical Devices"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62269a64e9f8d17d4c9f813c\/master\/pass\/Security-Remote-IT-access-platform-for-IoT-1126962071.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 08 Mar 2022 05:01:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Specialized health care<\/span> devices, from imaging tools like CT scanners to diagnostic lab equipment, are often <a href=\"https:\/\/www.wired.com\/2017\/03\/medical-devices-next-security-nightmare\/\">inadequately protected<\/a> on <a href=\"https:\/\/www.wired.com\/story\/defcon-medical-device-village-hacking-hospital\/\">hospital networks<\/a>. Now, <a data-offer-url=\"https:\/\/www.forescout.com\/resources\/access-7-supply-chain-vulnerabilities-can-allow-unwelcomed-access-to-your-medical-and-IoT-Devices\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.forescout.com\/resources\/access-7-supply-chain-vulnerabilities-can-allow-unwelcomed-access-to-your-medical-and-IoT-Devices&quot;}\" href=\"https:\/\/www.forescout.com\/resources\/access-7-supply-chain-vulnerabilities-can-allow-unwelcomed-access-to-your-medical-and-IoT-Devices\" rel=\"nofollow noopener\" target=\"_blank\">new findings<\/a> about seven vulnerabilities in an internet of things remote management tool underscore the interconnected exposures in medical devices and the broader IoT ecosystem.<\/p>\n<p class=\"paywall\">Researchers from the health care security firm CyberMDX, which was acquired last month by the IoT security firm Forescout, found the <a data-offer-url=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-067-01\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-067-01&quot;}\" href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-067-01\" rel=\"nofollow noopener\" target=\"_blank\">seven easily exploited vulnerabilities<\/a>, collectively dubbed Access:7, in the IoT remote access tool PTC Axeda. The platform can be used with any embedded device, but it has proven particularly popular in medical equipment. The researchers also found that some companies have used it to remotely manage ATMs, vending machines, barcode scanning systems, and some industrial manufacturing equipment. The researchers estimate that the Access:7 vulnerabilities are in hundreds of thousands of devices in all. In a review of its own customers, Forescout found more than 2,000 vulnerable systems.<\/p>\n<p class=\"paywall\">\u201cYou can imagine the type of impact an attacker could have when they can either exfiltrate data from medical equipment or other sensitive devices, potentially tamper with lab results, make critical devices unavailable, or take them over entirely,\u201d says Daniel dos Santos, head of security research at Forescout.<\/p>\n<p class=\"paywall\">Some of the vulnerabilities relate to issues with how Axeda processes undocumented and unauthenticated commands, allowing attackers to manipulate the platform. Others relate to default configuration issues, like hard-coded, guessable system passwords shared by multiple Axeda users. Three of the seven vulnerabilities <a data-offer-url=\"https:\/\/www.forescout.com\/resources\/access-7-supply-chain-vulnerabilities-can-allow-unwelcomed-access-to-your-medical-and-IoT-Devices\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.forescout.com\/resources\/access-7-supply-chain-vulnerabilities-can-allow-unwelcomed-access-to-your-medical-and-IoT-Devices&quot;}\" href=\"https:\/\/www.forescout.com\/resources\/access-7-supply-chain-vulnerabilities-can-allow-unwelcomed-access-to-your-medical-and-IoT-Devices\" rel=\"nofollow noopener\" target=\"_blank\">rate as critical<\/a>, and the other four are medium- to high-severity bugs.<\/p>\n<p class=\"paywall\">Attackers could potentially exploit the bugs to grab patient data, alter test results or other medical records, launch denial of service attacks that could keep health care providers from accessing patient data when they need it, disrupt industrial control systems, or even gain a foothold to attack ATMs.<\/p>\n<p class=\"paywall\">Vulnerabilities aren\u2019t necessarily uncommon in this space, but these would be particularly easy for an attacker to take advantage of. If exploited, the potential damage of the Access:7 bugs could be comparable to that of a <a href=\"https:\/\/www.wired.com\/story\/kaseya-supply-chain-ransomware-attack-msps\/\">recent spate of ransomware attacks<\/a>, which all stemmed from hackers <a href=\"https:\/\/www.wired.com\/story\/revil-ransomware-kaseya-flaw-fix-disclosure-april\/\">exploiting flaws<\/a> in IT management software from a firm called Kaseya. The products are different, but their ubiquity creates similar conditions for disruptive attacks. And Access:7 fits into a <a href=\"https:\/\/www.wired.com\/story\/urgent-11-ipnet-vulnerable-devices\/\">larger picture<\/a> of <a href=\"https:\/\/www.wired.com\/story\/namewreck-iot-vulnerabilities-tcpip-millions-devices\/\">inveterate<\/a> IoT <a href=\"https:\/\/www.wired.com\/story\/ripple20-iot-vulnerabilities\/\">insecurity<\/a> and <a href=\"https:\/\/www.wired.com\/story\/amnesia33-iot-vulnerabilitiesmay-never-get-fixed\/\">historic, unresolved<\/a> vulnerabilities.<\/p>\n<p class=\"paywall\">The researchers worked on <a data-offer-url=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-067-01\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-067-01&quot;}\" href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-067-01\" rel=\"nofollow noopener\" target=\"_blank\">coordinated disclosure<\/a> with PTC, which has <a data-offer-url=\"https:\/\/www.ptc.com\/en\/support\/article\/CS363561\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.ptc.com\/en\/support\/article\/CS363561&quot;}\" href=\"https:\/\/www.ptc.com\/en\/support\/article\/CS363561\" rel=\"nofollow noopener\" target=\"_blank\">released patches<\/a> for the flaws, as well as the US Cybersecurity and Infrastructure Security Agency, H-ISAC, and the Food and Drug Administration.<\/p>\n<p class=\"paywall\">\u201cThis disclosure is the culmination of a cooperative effort between PTC, CyberMDX, and CISA,\u201d PTC told WIRED in a statement. \u201cPTC and CyberMDX\u00a0collaborated to thoroughly investigate and implement appropriate remediations for the vulnerabilities. PTC then notified customers and guided their remediations ahead of disclosure \u2026 The result is greater awareness for users and the opportunity to resolve a potential threat to their systems and data.\u201d<\/p>\n<p class=\"paywall\">As with any IoT vulnerability disclosure, one of the big challenges is notifying customers, or former customers, and getting them to update their software or take other steps to mitigate their exposure. Axeda users who don&#x27;t want to risk disrupting critical systems by patching can still take protective steps like blocking certain network ports and adjusting configurations. And Forescout&#x27;s dos Santos notes that one advantage of the situation is that the vast majority of vulnerable devices are not exposed on the open internet, meaning they can&#x27;t be directly hacked remotely. Still, he cautions that vulnerable systems will be remotely accessible to an attacker who compromises a hospital or business network through other means.<\/p>\n<p class=\"paywall\">\u201cIt will take time for the downstream vendors to identify which devices are vulnerable on their networks and actually apply the patches on their products, so that&#x27;s why it&#x27;s important to raise awareness,&quot; dos Santo says. &quot;Remote management tools work to address some real problems for IoT, but the way this was deployed and configured also leads to problems.\u201d<\/p>\n<p class=\"paywall\">It&#x27;s a conundrum that has dogged IoT for years: Devices, particularly sensitive health-care-related devices, need to be easily patchable. But flaws in the mechanisms that enable that remote management create a whole new area of risk.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/access7-iot-vulnerabilities-medical-devices-atms\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62269a64e9f8d17d4c9f813c\/master\/pass\/Security-Remote-IT-access-platform-for-IoT-1126962071.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 08 Mar 2022 05:01:00 +0000<\/strong><\/p>\n<p>The so-called Access:7 vulnerabilities are the latest high-profile IoT security fumble.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-18453","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18453"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18453\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18453"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}