Security platform provider Armis today announced a patch and mitigation steps to address  in the firmware for a pneumatic tube system used by more than 3,000 hospitals, primarily in North America. According to Armis, the firmware powers all current models of the Translogic pneumatic tube system station made by Swisslog Healthcare. For more on the vulnerabilities and recommended actions, see the Armis .

John Riggi, AHA senior advisor for cybersecurity and risk, said, 鈥淎lthough the mechanical principles of pneumatic tubes date back over 100 years, today鈥檚 pneumatic tubes for delivering medications, blood products and lab samples across multiple departments of a hospital are highly computerized and network-connected, making them highly efficient. However, the vulnerabilities identified make them susceptible to cyber or ransomware attack. Disruption of a hospital pneumatic tube system would have widespread impact on care delivery operations, potentially resulting in delay of treatment and the need for increased emergency staffing to hand carry the essential items between departments.鈥  

For further information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org
 

Related News Articles

Chairperson's File
Public
Cybersecurity and physical threats are unfortunately significant enterprise risks for health care, regardless of size or location. Every hospital, physician鈥
Headline
The Cybersecurity and Infrastructure Security Agency April 17 released guidance to reduce risks associated with a reported breach of Oracle cloud services.鈥
Headline
The National Counterintelligence and Security Center, the FBI, and the Defense Counterintelligence and Security Center yesterday released guidance on鈥
AHA Cyber Intel
While the rate of cyberattacks on hospitals has risen dramatically, the severity of the impacts has also grown exponentially. Let鈥檚 look at the state of cyber鈥
Headline
The House Energy and Commerce Oversight and Investigations Subcommittee April 1 discussed cybersecurity threats in legacy medical devices during a hearing. The鈥
Headline
The Trump Administration March 28 announced that it renewed for one year the public emergency for ongoing malicious cyber-enabled activities against the U.S.鈥