Security Researchers Expose Bug In Medical System Used With X-Ray Machines, Other Devices

  /     /     /  
Publicated : 22/11/2024   Category : security


Security Researchers Expose Bug In Medical System Used With X-Ray Machines, Other Devices


ICS-CERT now handling medical device vulnerability alerts in addition to SCADA/ICS vulnerabilities



[UPDATED with Philips comments and clarifying that the product interfaces with X-ray machines, but is not an X-ray machine as originally reported.]
MIAMI, FL -- S4 Conference – A pair of researchers best known for poking holes in industrial control systems (ICS) products found that medical devices suffer similar security woes after they were able to easily hack into a Philips medical information management system that directly interfaces with X-ray machines and other medical devices.
Terry McCorkle and Billy Rios, both of Cylance, today demonstrated how a rudimentary fuzzer they wrote basically gave them privileged user status on the XPER system. The machine has inherently weak remote authentication. Anything on it or whats connected to it was owned, too, Rios said in a talk here at the S4 ICS conference. By design, these things connect to a database as well, he said.
The researchers at first werent sure where to go with their findings. We didnt know what to do with the vulnerabilities we found ... so we reached out to ICS-CERT and a couple of days later, the ICS-CERT said they would be the lead CERT for medical device vulnerabilities, he said.
Somehow, the FDA [Food and Drug Administration] is now involved as well, Rios said.
Turns out there is some overlap vendor-wise with electronic medical devices and ICS products: Siemens, Philips, Honeywell, and GE all provide products to both industries. The system and other medical device security problems mirror some of the same types of shortcomings Rios and McCorkle have seen firsthand with ICS products, the researchers say.
They dont change their habits. The mentality we see and the attitudes are exactly the same when it comes to security, Rios said.
Its not the first time researchers have set their sights on medical device flaws. Medtronics insulin pumps were in the spotlight at Black Hat 2011 when
Jerome Radcliffe -- himself a diabetic -- demonstrated
how a hacker could turn off the pump remotely and also manipulate any setting on the pump without notifying the user.
[Researchers Billy Rios and Terry McCorkle have found more than 1,000 vulnerabilities in SCADA products, of which 98 are easily exploitable. See
Utilities Facing Brute-Force Attack Threat
.]
The researchers wrote a simple fuzzer -- one that throws a lot of cap As at an open port, according to Rios – to crack the XPER.
It was a very basic fuzz case, McCorkle said in an interview. This [machine] manages other medical devices, and you can do anything you want to it once youre in, he says. The system is used in many hospitals, he says. We were surprised how fast the FDA got involved, he says.
Getting their hands on the Philips medical equipment for testing wasnt easy, however. Many products, including the Philips XPER, are restricted and require licenses to purchase. But the researchers finally found a reseller who sold them the machine. When they opened it, they discovered an inventory tag on the device indicating it had come from a hospital in Utah, which they would not name.
So I pulled out some forensics software and made an image of the hard drive, Rios says.
They fuzzed the XPER system via a virtual machine, and Philips since has collected the machine and hard drive. They are checking if version 6 [of XPER] is vulnerable to this attack, but they dont know, Rios said. The researchers did not release an exploit: Its a little dangerous to do so, Rios notes.
A Philips spokesperson today said the flaw exists in an older version of XPER. Current Xper IM systems do not use this version of software, the spokesperson said.
If an XPER IM workstation is compromised by a potential vulnerability, that may affect the data management capability, but X-ray equipment continues to operate independently, he said.
In a follow-up statement issued to
Dark Reading
on Jan. 18, a spokesman added: Following initial notification of the potential vulnerability by Homeland Security, Philips initial review indicated that the issue was limited to an older version of the product. Philips continues to explore the possible impact of the vulnerability based on continued investigation and new information obtained at the security conference.
McCorkle decided to dig deeper and see how the medical industry itself was handling security. He took a crack at an iPad app used by doctors to monitor their patients. Aside from the big no-no of using RDP to connect from the iPad to a host over the Internet, the app also offers a demo account via the App Store. So they are sharing accounts. That tells me that they do not have that security mindset, McCorkle said.
He said the app lets an unknown user run on its app on the test server. I would imagine the server is probably already owned, McCorkle added.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security

▸ Car Sector Speeds Up In Security. ◂
Discovered: 23/12/2024
Category: security

▸ Making use of a homemade Android army ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Security Researchers Expose Bug In Medical System Used With X-Ray Machines, Other Devices