Change Healthcare Cardiology Devices have Code Execution Vulnerability Identified

by | Sep 3, 2019

A vulnerability has been discovered in Change Healthcare Cardiology, McKesson Cardiology, and Horizon Cardiology devices. The flaw could be target to take advantage by a locally authenticated user to insert files that could allow the attacker to run arbitrary code on an affected device.

The vulnerability – CVE-2019-18630 – was discovered by Alfonso Powers and Bradley Shubin of Asante Information Security who reported the vulnerability to Change Healthcare. Change Healthcare alerted the National Cybersecurity & Communications Integration Center (NCCIC) and a security advisory has now been released by US-CERT.

The vulnerability has been given a CVSS v3 base score of 7.8 out of 10 and is due to incorrect default permissions in the default installation. While the vulnerability only needs a low level of skill to exploit, a hacker would first need local system access which will restrict the potential for the flaw to be exploited.

Change Healthcare has published an advisory for users of these cardiology devices:

  • Horizon Cardiology 11.x and earlier versions
  • Horizon Cardiology 12.x
  • McKesson Cardiology 13.x
  • McKesson Cardiology 14. x
  • Change Healthcare Cardiology 14.1.x

Change Healthcare has created a patch to address the vulnerability. All users of the above impacted products have been warned to get in touch with their Change Healthcare Support representative to schedule the patch being installed.

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency advises the following mitigations to minimize the potential for the vulnerability to be exploited until such time as the patch can be put in place:

  • Restrict network exposure for control system devices and/or systems.
  • Place medical devices behind firewalls
  • Keep medical devices as far apart as possible
  • Create safeguards that limit access to medical devices to authorized personnel
  • Use the principle of least privilege to access controls.
  • Implement defense-in-depth strategies
  • Turn off unnecessary accounts, protocols and services.

Before adding any mitigations, healthcare providers should complete an impact risk analysis and risk assessment.

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.


Please enable JavaScript in your browser to complete this form.

Patrick Kennedy

Patrick Kennedy is a highly accomplished journalist and editor with nearly two decades of experience in the field. With expertise in writing and editing content, Patrick has made significant contributions to various publications and organizations. Over the course of his career, Patrick has successfully managed teams of writers, overseeing the production of high-quality content and ensuring its adherence to professional standards. His exceptional leadership skills, combined with his deep understanding of journalistic principles, have allowed him to create cohesive and engaging narratives that resonate with readers. A notable area of specialization for Patrick lies in compliance, particularly in relation to HIPAA (Health Insurance Portability and Accountability Act). He has authored numerous articles delving into the complexities of compliance and its implications for various industries. Patrick's comprehensive understanding of HIPAA regulations has positioned him as a go-to expert, sought after for his insights and expertise in this field. Patrick's bachelors degree is from the University of Limerick and his master's degree in journalism is from Dublin City University. You can contact Patrick through his LinkedIn profile:

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.

Comprehensive HIPAA Training

Used in 1000+ Healthcare Organizations and 100+ Universities

    Full Course - Immediate Access

    Privacy Policy