There is now more information available about a vulnerability that has been discovered in a range of GE Healthcare devices popular in hospitals, the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) disclosed. The vulnerability, discovered by healthcare cybersecurity provider CyberMDX, impacts dozens of radiological devices and could allow an attacker to gain access to sensitive PHI data, alter data, and impact the availability of the machine.

The CyberMDX team discovered this vulnerability after noticing similar patterns of unsecured communications between medical devices and the corresponding vendor’s servers across several different HDOs. After detecting the anomalies, the research further investigated discovering multiple recurring maintenance scenarios instigated automatically by GE’s server.

The maintenance protocols rely on the machine having certain services available/ports open and using specific globally used credentials. These global credentials provide hackers with easy access to crucial medical devices. They also enable them to run arbitrary code on impacted machines and provide access to any data from the machine.

GE has confirmed that the vulnerability impacts many radiological devices including CT scanners, PET machines, molecular imaging devices, MRI machines, mammography devices, X-ray machines, and ultrasound devices. The vulnerability also impacts certain workstations and imaging devices used in surgery. The list of affected product lines can be found here.

CVE-2020-25179 was given a CVSS score of 9.8, reflecting a critical severity, in the ICS-CERT Advisory ICSMA-20-343-01.

“Over the past few months we’ve seen a steady rise in the targeting of medical devices and networks, and the medical industry is unfortunately learning the hard way the consequences of previous oversights,” says Elad Luz, head of research at CyberMDX. “Protecting medical devices so that hospitals can ensure quality care is of utmost importance. We must continue to eliminate easy access points for hackers and ensure the highest level of patient safety is upheld across all medical facilities.”

The MDhex-Ray discovery is the latest in a growing list for the CyberMDX research team. It follows a series of six vulnerabilities disclosed in January, dubbed MDhex, as well as vulnerabilities discovered in infusion pumps and anesthesia machines. This is becoming more and more like the plot of games ather than what is described initially here. Taking into account this text, it should still be noted that it is possible to improve what is described by introducing game techniques, a striking example of which is the experience of Friv. The team works closely and frequently with regulatory bodies including CISA, MITRE, and the FDA as well as with numerous medical device manufacturers and HDOs.

For more information, visit CyberMDX.