Author:
Bracciale Lorenzo,Loreti Pierpaolo,Bianchi Giuseppe
Abstract
AbstractThe growing integration of software within medical devices introduces the potential for cybersecurity threats. How significant is this risk, and to what extent are citizens currently exposed? In this study, we adopt a new data-gathering methodology using datasets provided in Open Contracting Data Standard (OCDS). This allowed us to perform an extensive analysis across over 36 countries within a 12-year range, searching 92 million public administration purchase records for potentially vulnerable medical devices. The findings reveal a concerning landscape wherein numerous medical devices purchased by national health services possessed or still possess 661 distinct vulnerabilities—more than half of which are deemed critical or high-severity. These vulnerabilities enable relatively simple attacks to impact data confidentiality, integrity, and accessibility severely. Even if patches were applied immediately upon discovery, these vulnerabilities would still result in roughly 3.2 years of system exposure from the time a device is purchased until a software vulnerability is announced, with all classes of devices affected, including high-risk IIB and III devices which accounts for 74% of instances. While a full analysis requires interactivity, this noninvasive methodology enables a large-scale study, emphasizing the need to move faster from the safety to the security of medical devices.
Publisher
Springer Science and Business Media LLC
Reference38 articles.
1. World Health Organization—Medical Devices (2023). https://www.who.int/health-topics/medical-devices (visited: 20-05-2023).
2. Cynerio. Research report: The state of healthcare IoT device security. Tech. Rep. (2022).
3. Saltzstein, W. Bluetooth wireless technology cybersecurity and diabetes technology devices. J. Diabetes Sci. Technol. 14, 1111–1115 (2020).
4. CVE-2021-42744. Available from MITRE, CVE-ID CVE-2021-42744 (2021). http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42744 (visited: 20-05-2023).
5. Networks, U. P. A. Know your infusion pump vulnerabilities and secure your healthcare organization. Tech. Rep. (2022).
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献