{"id":8650,"date":"2015-05-12T12:55:51","date_gmt":"2015-05-12T16:55:51","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=8650"},"modified":"2019-11-15T13:58:58","modified_gmt":"2019-11-15T11:58:58","slug":"drug-pump-security-bugs","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/drug-pump-security-bugs\/8650\/","title":{"rendered":"Critical Security Vulnerabilities in Drug Injection Pumps"},"content":{"rendered":"<p>In yet <a href=\"https:\/\/www.kaspersky.co.za\/blog\/hacking-robotic-surgeons\/\" target=\"_blank\" rel=\"noopener\">another example of smart medical device insecurity<\/a>, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that could allow an attacker to take complete control of affected pumps or simply render them useless.<\/p>\n<p>These drug infusion pumps are part of the new wave of smart and connected medical devices. As we\u2019ve written here before, <a href=\"https:\/\/www.kaspersky.co.za\/blog\/hacking-humans\/\" target=\"_blank\" rel=\"noopener\">particularly with regard to high-tech insulin pumps<\/a>, smart medical devices essentially remove the risk of human error for people requiring the chronic administration of drugs. Unfortunately, many of the companies developing these devices have repeatedly demonstrated a complete disregard for security.<\/p>\n<div class=\"pullquote\">It is not only susceptible to attack, it is so poorly programmed it can be rendered a useless brick with a single typo<\/div>\n<p>Hospira\u2019s Lifecare PCA Drug Infusion pumps are so vulnerable, in fact, security researcher Jeremy Richards said, they were the least secure IP-enabled device he had ever worked with. Richards says a remote attacker could render impacted devices utterly useless, a process known popularly as bricking.<\/p>\n<p>\u201cIt is not only susceptible to attack,\u201d Richards wrote, \u201cit is so poorly programmed it can be rendered a useless brick with a single typo.\u201d<\/p>\n<p>He claims potential attackers could also update device software, run commands, and manipulate the drug-specific libraries that correspond with barcodes printed onto vials containing critical dosage and other information.<\/p>\n<p>Interestingly, not one, but two researchers discovered the drug injection bugs independently. First Billy Rios, who\u2019s known for <a href=\"https:\/\/www.kaspersky.co.za\/blog\/hacking-the-airport-security-scanner\/\" target=\"_blank\" rel=\"noopener\">having hacked airport security<\/a>, <a href=\"https:\/\/www.kaspersky.co.za\/blog\/internet-of-crappy-things\/\" target=\"_blank\" rel=\"noopener\">carwash<\/a> and <a href=\"https:\/\/www.kaspersky.co.za\/blog\/internet-of-crappy-things-2\/\" target=\"_blank\" rel=\"noopener\">home automation systems<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A security flaw in a widely used IV pump lets hackers raise drug-dosage limits <a href=\"http:\/\/t.co\/8FuMz23ngG\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/8FuMz23ngG<\/a><\/p>\n<p>\u2014 WIRED (@WIRED) <a href=\"https:\/\/twitter.com\/WIRED\/status\/586337339867320320?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 10, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>While Rios\u2019s research, disclosed to ICS-CERT more than a year ago, remains unpublished, Richards went public last week. Rios gave Richards his blessing on Twitter to publish his findings.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/dyngnosis?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@dyngnosis<\/a> submitted to ICS-CERT a year ago, but feel free to publish!<\/p>\n<p>\u2014 Billy Rios (@XSSniper) <a href=\"https:\/\/twitter.com\/XSSniper\/status\/593245276766273536?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 29, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>More broadly and troublingly, these Hospira devices store network Wi-Fi protected access (WPA) keys in plain-text. If an attacker was able to steal one of these WPA keys, it would expose every other device on the same network to passive snooping and potentially scores of other attacks as well. These keys could be grabbed from out-of-service devices too, if the hospital fails to wipe the network keys before retiring or selling devices. Simpler yet, these devices contain an exposed ethernet port which could allow for simple and fast local attacks using automated hacking tools.<\/p>\n<p>It\u2019s not clear if Hospra intends on fixing the vulnerabilities. Richards claims they are planning on doing so, but the company\u2019s own statements seem to contradict that claim.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Certain #Hospira drug #infusion pumps contain dangerous and easily exploitable #security vulnerabilities<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6XsZ&amp;text=Certain+%23Hospira+drug+%23infusion+pumps+contain+dangerous+and+easily+exploitable+%23security+vulnerabilities\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In an email response to our <a href=\"https:\/\/threatpost.com\/vulnerability-riddled-drug-pumps-open-to-takeover\/112629\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost colleague, Chris Brook<\/a>, Hospira said, \u201cThere are no instances of Hospira devices being breached in a clinical setting and Hospira has taken a proactive approach to address potential cybersecurity vulnerabilities.\u201d<\/p>\n<p>The company claims it has communicated how to address these vulnerabilities to its existing customers. However, the company did not say it will address the vulnerabilities in any of its existing products. Hospira says it plans to mitigate these concerns in future products.<\/p>\n<p>\u201cIt\u2019s also worth noting that exploiting vulnerabilities requires penetrating several layers of network security enforced by the hospital information system, including secure firewalls,\u201d the company said in a statement. \u201cThese network security measures serve as the first and strongest line of defense against tampering and the pumps and software provide an additional layer of security.\u201d<\/p>\n<p>In the meantime, we\u2019ll leave you with this:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Don't buy a Hospira PCA drug  pump to do security stuff.  Busybx no passwd shell on 23, no-auth CGIs, also never hook it up to a human being<\/p>\n<p>\u2014 dyngnosis (@dyngnosis) <a href=\"https:\/\/twitter.com\/dyngnosis\/status\/592671049487142913?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 27, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It was recently discovered that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.<\/p>\n","protected":false},"author":42,"featured_media":8653,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1093,1091,1092,97,1094],"class_list":{"0":"post-8650","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-embedded-medical-devices","9":"tag-it","10":"tag-medical-device-security","11":"tag-security-2","12":"tag-smart-medical-devices"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/drug-pump-security-bugs\/8650\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/drug-pump-security-bugs\/3373\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/drug-pump-security-bugs\/5331\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/drug-pump-security-bugs\/5741\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/drug-pump-security-bugs\/6041\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/drug-pump-security-bugs\/6036\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/drug-pump-security-bugs\/7736\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/drug-pump-security-bugs\/8650\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/drug-pump-security-bugs\/4523\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/drug-pump-security-bugs\/7581\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/drug-pump-security-bugs\/7736\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/drug-pump-security-bugs\/8650\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/embedded-medical-devices\/","name":"embedded medical devices"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/8650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=8650"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/8650\/revisions"}],"predecessor-version":[{"id":24607,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/8650\/revisions\/24607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/8653"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=8650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=8650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=8650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}