Medtronic is acknowledging that it took too long to analyze a cybersecurity problem that hackers say could allow a malicious attacker to compromise the system used to update the software on defibrillators implanted in patients' chests.
The Minnesota-run medical device maker said the vulnerabilities in its CareLink 2090 programmers for implantable defibrillators worldwide don't create a safety risk for patients, but the company has stepped up internal integrity checks on its network and amplified its advice to keep the devices in a secure environment without access to the internet.
The Homeland Security Department published a brief security advisory about the issue last week. Billy Rios, the founder of the firm WhiteScope LLC that discovered the flaws, says it took Medtronic over a year to handle flaws that should have taken weeks to address.
The WhiteScope report says cybersecurity vulnerabilities in systems like those in Medtronic's CareLink 2090 defibrillator programmer could allow a malicious hacker to remotely tamper with the programmer or the implanted device.
Rios says he was so dismayed by Medtronic's laggard pace in addressing the findings of his January 2017 report that he's likely to bring future vulnerability reports directly to regulators like the Food and Drug Administration rather than alerting the company first, as is common practice in the industry.
"This was probably the most frustrating disclosure of a cybersecurity vulnerability of any medical device I've ever encountered," Rios said. "They have a responsibility to figure this stuff out and not try to essentially slow-play researchers to try to make them go away. That's why I'm so frustrated here. We've worked with all the major manufacturers in the pacemaker ecosystem. … None of them have treated us this way."
Two independent security researchers who reviewed the WhiteScope report confirmed that it appeared to use sound methodology to reach its conclusions. The researchers said the root of the vulnerability is that the CareLink 2090 programmers appear to use commercially available software, including an embedded version of the Microsoft XP operating system that hasn't been supported by Microsoft since 2016.
The report says WhiteScope researchers were able to use known vulnerabilities in the underlying software to exploit weaknesses in a used CareLink 2090 unit purchased online. The WhiteScope hackers got the system to cough up several network and device passwords, which together could be used to compromise Medtronic's network for pushing software updates to devices, the report says.