Hospitals Still Use Respiratory Tubes – And They Can Be Stolen

[ad_1]
All of that too common to find errors that can be used in clinical practice, from mammography machines and CT scans that pacemakers and insulin pumps. But it seems that this phenomenon reaches the walls: Researchers have found about a dozen complications in the popular pneumatic tube delivery system that many hospitals use to transport and distribute essential supplies such as lab and pharmaceutical models.
Air tubes can look like wonky is an old office expertise, highly qualified Representative Hudsucker than the modern method of health care. Yet it is surprising that it is so common. Swisslog Healthcare, a well-known medical expert in the design of pneumatic tube systems, says that more than 2,300 hospitals in North America use its “TransLogic PTS” platform, as well as 700 anywhere in the world. The nine threats that Armis’s integrated weapons company researchers found in Swisslog’s Transloggic Nexus Control Panels could allow hackers to take over the system, remove it from the Internet, connect with others, or damage the air network.
“You’re looking at one of the electronic devices that are connected to the internet and I think, what’s wrong with that?” So says Ben Seri, vice president of research at Armis. “But when you look inside you see that everything is in perfect harmony, and that is difficult, because these systems perform vital functions in a hospital. A reliable medical care.”
The attackers can direct the pneumatic tube as one part of redemption, delays laboratory testing and drug distribution. Or scammers can monitor how they send spies. They can disrupt delivery systems or destroy models very quickly using motors, bombers, robotic weapons, and other industrial equipment that work very carefully to complete the delivery.
The risks that Armis researchers have found in TransLogic PTS offerings do not apply directly to open internet. But all of these are easy-to-use shortcomings, broken password breaches, flooding buffers, bad memory errors, and so on. Attackers on the same network as the pneumatic tubes page and controllers have several ways to control the system. Using other bugs, they are able to install their unofficial firmware on the Translogic Nexus Control Panel. For attackers, this will be a way to establish long-term monitoring, hospitals need to install another firmware removal program to deal with the attacks.
The investigators, who presented their findings at a Black Hat security conference in Las Vegas on Wednesday, informed Swisslog of the errors that occurred on May 1. The health company has been working together to resolve the issue and issued a security proposal. Armis says there are nine problems with which Swisslog counts eight, because the company sees two privacy problems listed as one risk, while Armis researchers say they are two different errors.
Swisslog has started distributing patches to all but one of the hardest. An unspecified error is a firmware verification problem; The company is currently in the process of making standard checks, but is said to be facing some challenges for customers at the moment. There is no single exchange method or platform that Swisslog shares patches. The company says different clients have different setups, “based on medical expertise and preferences.” Armis says that in practice it can be difficult for hospitals to implement the changes.
[ad_2]
Source link



