URGENT/11 vulnerabilities showcase cybersecurity risks for connected medical devices

9 October 2019 (Last Updated October 22nd, 2019 15:58)

The URGENT/11 vulnerabilities allow attackers to remotely take over internet-connected devices, bypassing perimeter security measures such as firewalls.

URGENT/11 vulnerabilities showcase cybersecurity risks for connected medical devices

On 1 October, the US Food and Drug Administration (FDA) released a safety communication regarding a set of 11 cybersecurity vulnerabilities, referred to as the URGENT/11, which could potentially leave large numbers of connected medical devices open to exploitation by remote attackers.

Although the FDA assured the public that there have not yet been any reported attacks, the breadth of devices put at risk by these vulnerabilities and the extreme level to which the vulnerable systems could be manipulated is staggering. GlobalData believes that this event is a robust demonstration of the growing importance of cybersecurity solutions in the healthcare industry.

The URGENT/11 vulnerabilities were discovered by researchers from Armis, a small cybersecurity firm specialising in security for connected devices. The weak code was identified in a third-party software component called IPnet, which helps support network communications between computers. The IPnet software is currently owned by Wind River and is used in the company’s real-time operating system (RTOS), VxWorks. RTOSs are built to process data in real-time with high reliability and accuracy — a function crucial to many devices used in the healthcare sector, such as patient monitors and infusion pumps.

According to Armis, with more than two billion devices using the software across industries, VxWorks is the most widely used RTOS. Unfortunately, the problem is not just limited to VxWorks. Before the IPnet software was acquired by Wind River in 2006, it had been sold as a third-party library and was incorporated into a variety of other RTOSs. Although the acquisition occurred 13 years ago, some RTOSs continue to use IPnet and are thus at risk of attack.

A list of RTOSs containing IPnet has been made available, but there may be others. Before 2006, the code was sold as a permanent license and was subject to very few updates after the initial sale, which can make it difficult to trace.

The URGENT/11 vulnerabilities allow attackers to remotely take over internet-connected devices, bypassing perimeter security measures such as firewalls. As such, the vulnerabilities can be used to deliver malware within networks and between different connected devices. One example given by Armis on its company blog was the remote infiltration of a vulnerable patient monitor in a hospital via an internal connection to a similarly vulnerable cloud-connected printer. Using these weaknesses, a remote user could take control of a medical device and change its function, cause information leaks, or shut down the machine entirely. In a dramatic video on the company blog, Armis demonstrated how an attacker could hijack a patient monitor in a hospital and record patient data or even fake an emergency such as cardiac flat-line. In another example, the company described how the vulnerability could be used to remotely shut down an infusion pump, leaving a patient without life-saving supportive care.

GlobalData forecasts that by 2021, the global cybersecurity market will be worth $143bn, up from $114bn in 2017. Events like the discovery of the URGENT/11 vulnerabilities highlight why such strong growth is expected, particularly in the healthcare sector. With the increasing usage of big data in monitoring patient health, medical devices are steadily becoming more connected to the internet and other medical devices. Although this new level of connectivity is transforming patient care, close attention must be given to the design of these devices and the software on which they run.

As many medical devices require a longer period of development and regulatory approvals compared to consumer devices, they typically have longer life cycles once they are in use. This means that when a device manufacturer designing a new product, cybersecurity must be considered for the entire foreseeable life cycle of that product. On top of this intensive design work, the ongoing product maintenance and updates require a great deal of manpower and expertise. Additionally, organisations like hospitals can no longer allow cybersecurity to be an afterthought. To counter cybersecurity risks, hospitals may need to invest in an on-site cybersecurity team or contract out to a managed security service.

Luckily, it appears the URGENT/11 vulnerabilities were identified before any great harm could be done. The FDA’s announcement provides recommendations for device manufacturers, healthcare providers and healthcare facility staff on how to address the threats and notes that many parties have already begun to identify risks and implement remedial solutions such as software patches. However, it cannot be ignored that these large-scale software issues are occurring more and more frequently, highlighting the vital importance of cybersecurity products and services in protecting the more connected healthcare systems of the future.

Related report

GlobalData (2018) Thematic Research: Cybersecurity in Healthcare, August 2018, GDHCTR004