Medical device maker Medtronic PLC has acknowledged cybersecurity vulnerabilities in its products five times this year as it comes under increasingly hard-nosed scrutiny from independent computer security experts.
At a major cybersecurity conference in Las Vegas last week, outside researchers Billy Rios and Jonathan Butts made international headlines when they demonstrated exploits that they said would allow a malicious hacker to change the therapy delivered by an implanted heart device or insulin pump. They purported to show how a pacemaker could stop pacing the heart, or an insulin pump could stop delivering insulin.
Rios, founder of the Denver-based independent security firm WhiteScope LLC, said Medtronic has been slow and opaque in acknowledging the vulnerabilities. In one case, he noted, Medtronic acknowledged mild-sounding vulnerabilities in its CareLink 2090 device programmer in February, only to add a more serious potential risk in June.
Medtronic says the likelihood of a breach of a patient's device is low, and the company isn't aware of any security breaches involving patients with its medical devices. The company, headquartered in Ireland with operational headquarters in Fridley, says it vigorously tests its products and assesses vulnerabilities identified by researchers.
When needed, the company says, it issues software patches to deployed devices and makes security enhancements to its internal systems. In other cases, cybersecurity protections may amount to keeping certain devices switched off and locked away when not in use in doctor's offices.
"Product safety and quality are top priorities for Medtronic, and we have a strong product security program that leverages internal and external security and medical device experts, rigorous development processes and current practices to enable security and usability," spokeswoman Erika Winkels said via e-mail.
The five Medtronic security alerts published this year involve vulnerabilities in machines that are supposed to communicate with patients' implanted heart devices, neurostimulators, or body-worn insulin pumps.
Compromising these external devices could theoretically allow a hacker with knowledge of the system and physical proximity to the patient to change software or functions in an implanted or body-worn device.