The CISA is warning of a severe (9.8 out of 10) vulnerability in Medtronic’s Paceart Optima software that runs on the healthcare organization’s Windows server which stores and retrieves cardiac device data from programmers and remote monitoring systems from all major cardiac device manufacturers.
Medtronic said the vulnerability is within the Paceart Optima software’s messaging service which allows healthcare organizations to send fax, email, and pager messages within the system.
Medtronic has not seen any exploitation of the bug so far but said in a security bulletin:
“This vulnerability could result in a healthcare delivery organization’s Paceart Optima system’s cardiac device data being deleted, stolen, or modified, or the Paceart Optima system being used for further network penetration.”
Medtronic’s security bulletin includes immediate and temporary steps for healthcare delivery organizations and encourages those affected to work with Medtronic Paceart technical support to install an update to eliminate the vulnerability.
George McGregor, VP, Approov had this comment:
“The Optima software aggregates and displays cardiac data collected from multiple sources so a vulnerability here can have major consequences. But it is also important to evaluate the interplay of embedded devices such as insulin pumps, cardiac monitors and pacemakers and the associated mobile apps which are increasingly used to collect data and control the device. A look at medical device manufacturer security advisories seems to suggest that this can be a major attack surface which must be protected.”
Roy Akerman, Co-Founder & CEO, Rezonate follows up with this:
“Healthcare is constantly at the forefront dealing with an expanded attack surfaces – as in the case of the Optima software with a vulnerable MIoT (Medical Internet of Things). As RCE can be enabled if exploited, instant patching based on guidance provided by Medtronic is advised. Most often priority is defined based on exploitability, overall risk and impact, and access, in this case, when the risk may include deadly consequences, priority should be applied for an immediate patch and monitoring.”
Given how much we now rely on tech in healthcare, issues like these should not happen. Companies need to take more care to ensure that vulnerabilities like these aren’t threats to patient care.
BREAKING: Petro Canada FINALLY Says Something About Being Pwned
Posted in Commentary with tags Petro Canada on July 6, 2023 by itnerdFor the last few weeks now, it’s been public knowledge that it has been pwned in some sort of “cybersecurity incident.” For context, here’s a list of stories that I’ve written about this:
Today is July 6th and Petro Canada finally, and I do mean FINALLY has something to say on the matter. This email just hit my inbox:
You can also read the email online here.
So since I am a member of the Petro Points program, the threat actors now have my name, mailing address, and email address along with my phone number and date of birth. That pretty much guarantees that I along with every other member of the Petro Points program are going have very targeted attacks aimed at me in the near future. Not to mention the threat actors will make attempts at stealing my identity. I can also say that it’s a pretty safe bet that someone is going to find this response by Petro Canada to be inadequate and contact a lawyer to file a class action lawsuit. If that happens, I will be joining said lawsuit.
Honestly, after reading this I will not be able to trust Petro Canada again. Sure they could come out with a more detailed statement offering up how they got pwned, and what they’re doing to ensure that they don’t get pwned again. And they can do something more than offer up a credit of Petro Points. For example. Credit monitoring for the next year or two for every Petro Points customer would be a good start. But I don’t see that happening. Thus when this is resolved, whenever that is, I will be cashing out my Petro Points and I will not be doing business with Petro Canada again. But I will be watching this story closely as I fully expect that there will be a lot of developments in the days and weeks ahead.
Leave a comment »