Submitted via IRC for SoyCow4463
Researchers discovered two vulnerabilities in Alaris Gateway Workstations that are used to deliver fluid medication. One of them is critical and an attacker could leverage it to take full control of the medical devices connecting to it.
A flaw in the firmware code of the device has been assigned the highest severity score, a perfect 10, so it can be exploited remotely and without authentication. The other issue received is less severe and affects the workstation's web-based management interface.
[...] Researchers at CyberMDX discovered that AGW's firmware can be replaced remotely with a custom version. An attacker sitting on the same network as the target system would be able "update and manipulate a CAB file, which stores files in an archived library and utilizes a proper format for Windows CE," say the researchers.
With this type of access, the adversary would be able to alter the dosage of the drug dispensed by certain models of infusion pumps connected to an AWG, which are common in hospital wards and intensive care units.
(Score: 2) by NotSanguine on Tuesday June 18 2019, @07:08PM
The editors decide which submissions to accept, and which to decline.
They have the first and last say about it.
I'm guessing that if you asked, and were willing to put in the time and effort required to keep the stories coming, on your own time, with no compensation or reward other than keeping the queue stocked with stories, and take the abuse from folks who don't like your editorial decisions, you could be bad-mouthed by users too.
Sounds like a plum job, eh?
No, no, you're not thinking; you're just being logical. --Niels Bohr