Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Hardcoded Credentials Found in Medical System

Carnegie Mellon University’s CERT has issued a security advisory on the MEDHOST Perioperative Information Management System (PIMS), a system designed to streamline the progress from patient introduction to surgery. It’s not a vulnerability we should expect these days – especially for a medical system – but PIMS contains hardcoded credentials. These credentials provide access to the customer database.

Carnegie Mellon University’s CERT has issued a security advisory on the MEDHOST Perioperative Information Management System (PIMS), a system designed to streamline the progress from patient introduction to surgery. It’s not a vulnerability we should expect these days – especially for a medical system – but PIMS contains hardcoded credentials. These credentials provide access to the customer database.

“An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with the application database server may be able to obtain or modify patient information,” warns the CERT advisory

“With the surgery department so critical to a hospital’s financial well-being and patient safety initiatives, there’s no room for inefficiencies or costly mistakes,” says the MEDHOST website. …this comprehensive suite of applications fits within existing perioperative workflows, reducing scheduling delays and improving overall patient care.”

MEDHOST has not published any information about this vulnerability. PIMS itself contains several different modules. It isn’t clear from the advisory whether access to the customer database could also provide access to the different modules, such as PIMS Surgery. Nevertheless, the ability to obtain or alter patient data is a serious issue.

MEDHOST has addressed the problem in version PIMS 2015R1 and newer. Administrators are advised to upgrade to the latest version. This is particularly important now that the vulnerability has been made public – malicious actors could reverse earlier versions to obtain the credentials.

The danger with hardcoded credentials is that they can be used to bypass what might otherwise be very strong authentication procedures developed and trusted by the administrators. Since the product can be hosted and accessed remotely, administrators should ensure that only trusted sources can access the server hosting the product. This should be standard procedure whether using a vulnerable version or a newer fixed version.

The credentials do not seem to have been leaked, and it doesn’t appear as if they have been used for malicious purposes. The vulnerability was discovered and reported by Daniel Dunstedter.

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.