Change Healthcare Cardiology Devices have Code Execution Vulnerability Identified

by | Sep 3, 2019

A vulnerability has been discovered in Change Healthcare Cardiology, McKesson Cardiology, and Horizon Cardiology devices. The flaw could be target to take advantage by a locally authenticated user to insert files that could allow the attacker to run arbitrary code on an affected device.

The vulnerability – CVE-2019-18630 – was discovered by Alfonso Powers and Bradley Shubin of Asante Information Security who reported the vulnerability to Change Healthcare. Change Healthcare alerted the National Cybersecurity & Communications Integration Center (NCCIC) and a security advisory has now been released by US-CERT.

The vulnerability has been given a CVSS v3 base score of 7.8 out of 10 and is due to incorrect default permissions in the default installation. While the vulnerability only needs a low level of skill to exploit, a hacker would first need local system access which will restrict the potential for the flaw to be exploited.

Change Healthcare has published an advisory for users of these cardiology devices:

  • Horizon Cardiology 11.x and earlier versions
  • Horizon Cardiology 12.x
  • McKesson Cardiology 13.x
  • McKesson Cardiology 14. x
  • Change Healthcare Cardiology 14.1.x

Change Healthcare has created a patch to address the vulnerability. All users of the above impacted products have been warned to get in touch with their Change Healthcare Support representative to schedule the patch being installed.

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency advises the following mitigations to minimize the potential for the vulnerability to be exploited until such time as the patch can be put in place:

  • Restrict network exposure for control system devices and/or systems.
  • Place medical devices behind firewalls
  • Keep medical devices as far apart as possible
  • Create safeguards that limit access to medical devices to authorized personnel
  • Use the principle of least privilege to access controls.
  • Implement defense-in-depth strategies
  • Turn off unnecessary accounts, protocols and services.

Before adding any mitigations, healthcare providers should complete an impact risk analysis and risk assessment.

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.

COMPREHENSIVE HIPAA TRAINING

Ryan Coyne

Ryan Coyne is a results-driven leader in the healthcare compliance industry, specializing in regulatory compliance, compliance training, and assisting healthcare organizations and business associates in achieving and maintaining compliance. With a deep knowledge of healthcare regulations and a keen understanding of the challenges faced by the industry, Ryan has developed a reputation as a trusted advisor and advocate for ethical and compliant practices in healthcare. Ryan has successfully advised and guided numerous healthcare organizations, business associates, and healthcare professionals on achieving and maintaining compliance with regulatory training requirements. Ryan's professional focus is using his in-depth expertise and leading a world class team of subject matter experts at ComplianceJunction in regulatory compliance to help organisations navigate the complex landscape of ensuring staff adhere to healthcare regulations. You can connect with Ryan via LinkedIn and follow on Twitter

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.

Comprehensive HIPAA Training

Used in 1000+ Healthcare Organizations and 100+ Universities

    Full Course - Immediate Access

    Privacy Policy