close
    • chevron_right

      Default password in radiology devices leaves healthcare networks open to attack

      Dan Goodin · news.movim.eu / ArsTechnica · Tuesday, 8 December, 2020 - 17:00

    Photograph of a complicated, intimidating medical device.

    Enlarge (credit: GE Healthcare )

    Dozens of radiology products from GE Healthcare contain a critical vulnerability that threatens the networks of hospitals and other health providers that use the devices, officials from the US government and a private security firm said on Tuesday.

    The devices—used for CT scans, MRIs, X-Rays, mammograms, ultrasounds, and positron emission tomography—use a default password to receive regular maintenance. The passwords are available to anyone who knows where on the Internet to look. A lack of proper access restrictions allows the devices to connect to malicious servers rather than only those designated by GE Healthcare. Attackers can exploit these shortcomings by abusing the maintenance protocols to access the devices. From there, the attackers can execute malicious code or view or modify patient data stored on the device or the hospital or healthcare provider servers.

    Aggravating matters, customers can’t fix the vulnerability themselves. Instead, they must request that the GE Healthcare support team change the credentials. Customers who don’t make such a request will continue to rely on the default password. Eventually, the device manufacturer will provide patches and additional information.

    Read 5 remaining paragraphs | Comments

    index?i=EsLZw1IvVL0:o7ednpfGULU:V_sGLiPBpWUindex?i=EsLZw1IvVL0:o7ednpfGULU:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA