News Vulnerability Management
Security Researchers Expose Bug In Medical System Used With X-Ray Machines, Other Devices
ICS-CERT now handling medical device vulnerability alerts in addition to SCADA/ICS vulnerabilities
[UPDATED with Philips comments and clarifying that the product interfaces with X-ray machines, but is not an X-ray machine as originally reported.]
MIAMI, FL -- S4 Conference – A pair of researchers best known for poking holes in industrial control systems (ICS) products found that medical devices suffer similar security woes after they were able to easily hack into a Philips medical information management system that directly interfaces with X-ray machines and other medical devices.
More Security Insights
White PapersMore >>
- Mobile Commerce: State of the Market
- Strategy: How to Conduct an Effective IT Security Risk Assessment
Terry McCorkle and Billy Rios, both of Cylance, today demonstrated how a rudimentary fuzzer they wrote basically gave them privileged user status on the XPER system. The machine has inherently weak remote authentication. "Anything on it or what's connected to it was owned, too," Rios said in a talk here at the S4 ICS conference. "By design, these things connect to a database" as well, he said.
The researchers at first weren't sure where to go with their findings. "We didn't know what to do with the vulnerabilities we found ... so we reached out to ICS-CERT and a couple of days later, the ICS-CERT said they would be the lead CERT" for medical device vulnerabilities, he said.
"Somehow, the FDA [Food and Drug Administration] is now involved" as well, Rios said.
Turns out there is some overlap vendor-wise with electronic medical devices and ICS products: Siemens, Philips, Honeywell, and GE all provide products to both industries. The system and other medical device security problems mirror some of the same types of shortcomings Rios and McCorkle have seen firsthand with ICS products, the researchers say.
"They don't change their habits. The mentality we see and the attitudes are exactly the same" when it comes to security, Rios said.
It's not the first time researchers have set their sights on medical device flaws. Medtronic's insulin pumps were in the spotlight at Black Hat 2011 when Jerome Radcliffe -- himself a diabetic -- demonstrated how a hacker could turn off the pump remotely and also manipulate any setting on the pump without notifying the user.
[Researchers Billy Rios and Terry McCorkle have found more than 1,000 vulnerabilities in SCADA products, of which 98 are easily exploitable. See Utilities Facing Brute-Force Attack Threat.]
The researchers wrote a simple fuzzer -- "one that throws a lot of cap As at an open port," according to Rios – to crack the XPER.
"It was a very basic fuzz case," McCorkle said in an interview. "This [machine] manages other medical devices, and you can do anything you want to it" once you're in, he says. The system is used in many hospitals, he says. "We were surprised how fast the FDA got involved," he says.
Getting their hands on the Philips medical equipment for testing wasn't easy, however. Many products, including the Philips XPER, are restricted and require licenses to purchase. But the researchers finally found a reseller who sold them the machine. When they opened it, they discovered an inventory tag on the device indicating it had come from a hospital in Utah, which they would not name.
"So I pulled out some forensics software and made an image of the hard drive," Rios says.
They fuzzed the XPER system via a virtual machine, and Philips since has collected the machine and hard drive. "They are checking if version 6 [of XPER] is vulnerable to this attack, but they don't know," Rios said. The researchers did not release an exploit: "It's a little dangerous" to do so, Rios notes.
A Philips spokesperson today said the flaw exists in an older version of XPER. "Current Xper IM systems do not use this version of software," the spokesperson said.
"If an XPER IM workstation is compromised by a potential vulnerability, that may affect the data management capability, but X-ray equipment continues to operate independently," he said.
In a follow-up statement issued to Dark Reading on Jan. 18, a spokesman added: "Following initial notification of the potential vulnerability by Homeland Security, Philips initial review indicated that the issue was limited to an older version of the product. Philips continues to explore the possible impact of the vulnerability based on continued investigation and new information obtained at the security conference."
McCorkle decided to dig deeper and see how the medical industry itself was handling security. He took a crack at an iPad app used by doctors to monitor their patients. Aside from the big no-no of using RDP to connect from the iPad to a host over the Internet, the app also offers a demo account via the App Store. "So they are sharing accounts. That tells me that they do not have that security mindset," McCorkle said.
He said the app lets an unknown user run on its app on the test server. "I would imagine the server is probably already owned," McCorkle added.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.