Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

St. Jude Patches Vulnerabilities in Cardiac Devices

St. Jude Medical has released security updates to patch some of the flaws discovered by MedSec in its cardiac devices, but the manufacturer insists that the risk of cyberattacks is very low.

St. Jude Medical has released security updates to patch some of the flaws discovered by MedSec in its cardiac devices, but the manufacturer insists that the risk of cyberattacks is very low.

The U.S. Food and Drug Administration (FDA) and the Department of Homeland Security (DHS) launched an investigation after investment research firm Muddy Waters and security company MedSec teamed up and disclosed a series of vulnerabilities found in St. Jude implantable cardiac devices.

Following its acquisition by Abbott Laboratories on January 4, St. June announced on Monday the availability of security updates for Merlin remote monitoring systems, one of the products found to be vulnerable by MedSec.

According to an advisory published by ICS-CERT, version 8.2.2 of the Merlin software patches a high severity vulnerability (CVE-2017-5149) that can be exploited by a remote attacker to intercept and manipulate communications between the Merlin unit and implanted cardiac devices. The updates will be rolled out automatically to affected devices over the next months.

Muddy Waters and MedSec disclosed the vulnerabilities as part of an investment strategy, claiming that St. Jude puts profits before patients. St. Jude has refuted the claims and even filed a lawsuit against the companies. Third-party researchers have taken the sides of both MedSec and St. Jude in the matter.

MedSec and Muddy Waters believe the patches released by St. Jude represent an acknowledgement of the vulnerabilities, and pointed out that some of the serious flaws still have not been addressed, including ones that could allegedly allow hackers to “control the implants.”

“After vehemently denying its devices suffer security vulnerabilities and then suing us, St. Jude issued a statement today that effectively vindicates the research published by MedSec and Muddy Waters,” said Carson Block of Muddy Waters Capital. “This long-overdue acknowledgement, just days after completion of St. Jude’s sale to Abbott Laboratories, reaffirms our belief that the company puts profits over patients. It also reaffirms our belief that had we not gone public, St. Jude would not have remediated the vulnerabilities.”

Justine Bone, CEO of MedSec, also issued a statement: “We acknowledge St. Jude Medical’s effort in the remediation of this vulnerability which was rated as High severity by the Department of Homeland Security. We eagerly await remediation efforts on the multitude of severe vulnerabilities that remain unaddressed including the ability to issue an unauthorized command from a device other than the Merlin @ Home device. MedSec remains available to assist Abbott Laboratories during this process.”

Advertisement. Scroll to continue reading.

St. Jude has pointed out that it’s not aware of any attacks or other cybersecurity incidents involving affected devices. The company, which has not dropped the lawsuit against MedSec and Muddy Waters, says it has released the security update to “further reduce the extremely low cyber security risks.”

While ICS-CERT classified the patched flaw as high severity, it also said the weakness can only be exploited by a highly skilled attacker.

The FDA has reviewed the vulnerabilities and confirmed that they can be exploited to remotely access implanted devices through the Merlin system and potentially cause rapid depletion of their battery. Attackers could also cause inappropriate pacing in the implanted device and deliver shocks to the victim.

However, the FDA has determined that “the health benefits to patients from continued use of the device outweigh the cybersecurity risks.”

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.