Sector News

Philips issues cybersecurity warning over e-Alert MRI monitoring system

March 31, 2022
Life sciences

While the shift to “smarter,” interconnected healthcare technology has undoubtedly improved the quality of patient care and health outcomes, it has also opened up an entirely new can of cybersecurity worms.

Philips is currently dealing with one such risk after an external researcher discovered a potential vulnerability in its e-Alert MRI monitoring system.

The e-Alert system is equipped with sensors to monitor MRI machines and issue alarms whenever certain factors veer from their preset parameters. The monitored criteria include the humidity and temperature of the technical and exam rooms; the status of a machine’s power supply; chiller, cryo compressor and helium levels; and the placement of its magnet.

According to a notice from the Cybersecurity and Infrastructure Security Agency, or CISA—part of the U.S. Department of Homeland Security—the issue concerns e-Alert systems running software version 2.7 and earlier.

Those systems fail to require any authentication for access to critical system functions, so “successful exploitation of this vulnerability may allow an unauthorized actor to remotely shut down the system” if they’re able to access a healthcare facility’s network, per CISA.

The potential hacking risk has been given a score of 6.5 out of 10, placing it on the higher end of the medium-severity range on the Common Vulnerability Scoring System, or CVSS.

In a statement sent to Fierce Medtech, Philips said it had “proactively and voluntarily” issued an advisory for the cybersecurity risk and alerted the appropriate government agencies as soon as it was discovered.

“At this time, Philips has received no reports of exploitation of this vulnerability,” the company said, noting that since the e-Alert system monitors only the performance of MRI machines, the hacking risk doesn’t pose a direct threat to patient safety.

Philips said it is expecting to issue a correction for the issue by the end of the second quarter of this year. In the meantime, healthcare facilities using the affected e-Alert systems should closely regulate access to their networks and connected devices and minimize remote and internet access to the systems.

This isn’t the first time hacking risks were discovered in Philips’ e-Alert technology. In 2018, Philips discovered and reported to CISA a total of nine cybersecurity flaws in the system that “may allow attackers to provide unexpected input into the application, execute arbitrary code, display unit information or potentially cause e-Alert to crash,” according to the agency’s notice.

The safety event was given a CVSS score of 7.1—just over the high-severity threshold—but all issues were resolved with software updates by the end of 2018.

By Andrea Park

Source: fiercebiotech.com

comments closed

Related News

February 25, 2024

Pharma CFOs need R&D vigilance in tough economic times

Life sciences

As inflation, high interest rates and a tight investment environment continue to create headaches, 72% of CFOs said economic volatility poses the same or greater risk to their business this year compared to 2023 in a recent survey from BDO — and there are more changes afoot.

February 25, 2024

Agilent CEO Mike McMullen to retire, succeeded by lab services head

Life sciences

McMullen, who’s also currently president of Agilent, is set to abdicate both roles on May 1, according to an announcement the company put out Wednesday afternoon. From there, McMullen will spend a few months serving as an advisor to Agilent and to his successor until his retirement becomes final on Oct. 31.

February 25, 2024

AstraZeneca completes Gracell Biotechnologies acquisition for $1.2bn

Life sciences

AstraZeneca has concluded its acquisition of China-based clinical-stage biopharmaceutical company Gracell Biotechnologies for $1.2bn. The acquisition, initially agreed in December 2023, positions Gracell as a wholly owned AstraZeneca subsidiary with operations continuing in the US and China.

How can we help you?

We're easy to reach