The Cybersecurity and Infrastructure Security Agency and Food and Drug Administration Jan. 30 released notices warning of vulnerabilities in the Contec CMS8000, a patient monitoring device used to display patient vital signs. The vulnerabilities also apply to Epsimed MN-120 patient monitors, which are Contec CMS8000 monitors relabeled as MN-120, according to the . 

The agencies found that the monitors could be remotely controlled by an unauthorized user or not work as intended. In addition, the software includes a backdoor, meaning the device or network to which the device has been connected may have been or could be compromised. When the monitor is connected to the internet, it collects patient data that includes personally identifiable information and protected health information. 

The vulnerabilities can allow unauthorized actors to bypass cybersecurity controls and then gain access to and potentially manipulate the device. 

鈥淭he identified vulnerabilities should be immediately addressed as they are now widely published and are no doubt within the hands of cyber adversaries who would seek to exploit them,鈥 said John Riggi, AHA national advisor for cybersecurity and risk. 鈥淲e would recommend that information security teams coordinate closely with clinical engineering or biomed teams to identify the inventory of affected monitors and to ensure patch status. 

鈥淓nsuring network segmentation of medical devices and maintaining enterprise-wide patch management programs are best practices. This vulnerability once again demonstrates the cyber risk exposure that hospitals and health systems face through insecure third-party technology, ultimately posing a risk to patient safety.鈥 

For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency April 17 released guidance to reduce risks associated with a reported breach of Oracle cloud services.鈥
Headline
The National Counterintelligence and Security Center, the FBI, and the Defense Counterintelligence and Security Center yesterday released guidance on鈥
AHA Cyber Intel
While the rate of cyberattacks on hospitals has risen dramatically, the severity of the impacts has also grown exponentially. Let鈥檚 look at the state of cyber鈥
Headline
The House Energy and Commerce Oversight and Investigations Subcommittee April 1 discussed cybersecurity threats in legacy medical devices during a hearing. The鈥
Headline
The Trump Administration March 28 announced that it renewed for one year the public emergency for ongoing malicious cyber-enabled activities against the U.S.鈥
Headline
The FBI March 26 advised that, after extensive investigation and intelligence review, they have not identified any specific credible threat targeted against鈥