While the shift to “smarter,” interconnected healthcare technology has undoubtedly improved the quality of patient care and health outcomes, it has also opened up an entirely new can of cybersecurity worms.
Philips is currently dealing with one such risk after an external researcher discovered a potential vulnerability in its e-Alert MRI monitoring system.
The e-Alert system is equipped with sensors to monitor MRI machines and issue alarms whenever certain factors veer from their preset parameters. The monitored criteria include the humidity and temperature of the technical and exam rooms; the status of a machine’s power supply; chiller, cryo compressor and helium levels; and the placement of its magnet.
According to a notice from the Cybersecurity and Infrastructure Security Agency, or CISA—part of the U.S. Department of Homeland Security—the issue concerns e-Alert systems running software version 2.7 and earlier.
Those systems fail to require any authentication for access to critical system functions, so “successful exploitation of this vulnerability may allow an unauthorized actor to remotely shut down the system” if they’re able to access a healthcare facility’s network, per CISA.
The potential hacking risk has been given a score of 6.5 out of 10, placing it on the higher end of the medium-severity range on the Common Vulnerability Scoring System, or CVSS.
In a statement sent to Fierce Medtech, Philips said it had “proactively and voluntarily” issued an advisory for the cybersecurity risk and alerted the appropriate government agencies as soon as it was discovered.
“At this time, Philips has received no reports of exploitation of this vulnerability,” the company said, noting that since the e-Alert system monitors only the performance of MRI machines, the hacking risk doesn’t pose a direct threat to patient safety.
Philips said it is expecting to issue a correction for the issue by the end of the second quarter of this year. In the meantime, healthcare facilities using the affected e-Alert systems should closely regulate access to their networks and connected devices and minimize remote and internet access to the systems.
This isn’t the first time hacking risks were discovered in Philips’ e-Alert technology. In 2018, Philips discovered and reported to CISA a total of nine cybersecurity flaws in the system that “may allow attackers to provide unexpected input into the application, execute arbitrary code, display unit information or potentially cause e-Alert to crash,” according to the agency’s notice.
The safety event was given a CVSS score of 7.1—just over the high-severity threshold—but all issues were resolved with software updates by the end of 2018.
By Andrea Park
In 2017, Sanofi partnered with the Lebanon, New Hampshire-based ImmuNext to develop an antibody for autoimmune diseases like lupus and multiple sclerosis, which included giving Sanofi a worldwide license to develop frexalimab. The agreement involved milestone payments upto $500 million.
Global manufacturer for the pharmaceutical, biotech and nutraceutical markets, Lonza has announced that it has acquired Synaffix, a biotech company focused on the commercialisation of its clinical stage technology platform for the development of antibody-drug conjugates (ADCs).
In its hunt for the new head of its pharmaceutical systems business—which makes syringes, self-injection systems and other drug delivery devices for 70% of the top 100 drugmakers in the world, according to the company—BD landed on a candidate with plenty of experience among that customer group.