Critical Security Vulnerabilities in Drug Injection Pumps

In yet another example of smart medical device insecurity, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that

In yet another example of smart medical device insecurity, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that could allow an attacker to take complete control of affected pumps or simply render them useless.

Critical Security Vulnerabilities in Drug Injection Pumps

These drug infusion pumps are part of the new wave of smart and connected medical devices. As we’ve written here before, particularly with regard to high-tech insulin pumps, smart medical devices essentially remove the risk of human error for people requiring the chronic administration of drugs. Unfortunately, many of the companies developing these devices have repeatedly demonstrated a complete disregard for security.

It is not only susceptible to attack, it is so poorly programmed it can be rendered a useless brick with a single typo

Hospira’s Lifecare PCA Drug Infusion pumps are so vulnerable, in fact, security researcher Jeremy Richards said, they were the least secure IP-enabled device he had ever worked with. Richards says a remote attacker could render impacted devices utterly useless, a process known popularly as bricking.

“It is not only susceptible to attack,” Richards wrote, “it is so poorly programmed it can be rendered a useless brick with a single typo.”

He claims potential attackers could also update device software, run commands, and manipulate the drug-specific libraries that correspond with barcodes printed onto vials containing critical dosage and other information.

Interestingly, not one, but two researchers discovered the drug injection bugs independently. First Billy Rios, who’s known for having hacked airport security, carwash and home automation systems.

While Rios’s research, disclosed to ICS-CERT more than a year ago, remains unpublished, Richards went public last week. Rios gave Richards his blessing on Twitter to publish his findings.

More broadly and troublingly, these Hospira devices store network Wi-Fi protected access (WPA) keys in plain-text. If an attacker was able to steal one of these WPA keys, it would expose every other device on the same network to passive snooping and potentially scores of other attacks as well. These keys could be grabbed from out-of-service devices too, if the hospital fails to wipe the network keys before retiring or selling devices. Simpler yet, these devices contain an exposed ethernet port which could allow for simple and fast local attacks using automated hacking tools.

It’s not clear if Hospra intends on fixing the vulnerabilities. Richards claims they are planning on doing so, but the company’s own statements seem to contradict that claim.

In an email response to our Threatpost colleague, Chris Brook, Hospira said, “There are no instances of Hospira devices being breached in a clinical setting and Hospira has taken a proactive approach to address potential cybersecurity vulnerabilities.”

The company claims it has communicated how to address these vulnerabilities to its existing customers. However, the company did not say it will address the vulnerabilities in any of its existing products. Hospira says it plans to mitigate these concerns in future products.

“It’s also worth noting that exploiting vulnerabilities requires penetrating several layers of network security enforced by the hospital information system, including secure firewalls,” the company said in a statement. “These network security measures serve as the first and strongest line of defense against tampering and the pumps and software provide an additional layer of security.”

In the meantime, we’ll leave you with this:

Tips

How to travel safely

Going on vacation? We’ve compiled a traveler’s guide to help you have an enjoyable safe time and completely get away from the routine.