Submitted via IRC for SoyCow4463
Researchers discovered two vulnerabilities in Alaris Gateway Workstations that are used to deliver fluid medication. One of them is critical and an attacker could leverage it to take full control of the medical devices connecting to it.
A flaw in the firmware code of the device has been assigned the highest severity score, a perfect 10, so it can be exploited remotely and without authentication. The other issue received is less severe and affects the workstation's web-based management interface.
[...] Researchers at CyberMDX discovered that AGW's firmware can be replaced remotely with a custom version. An attacker sitting on the same network as the target system would be able "update and manipulate a CAB file, which stores files in an archived library and utilizes a proper format for Windows CE," say the researchers.
With this type of access, the adversary would be able to alter the dosage of the drug dispensed by certain models of infusion pumps connected to an AWG, which are common in hospital wards and intensive care units.
(Score: 3, Funny) by NotSanguine on Tuesday June 18 2019, @10:58PM (1 child)
Because you said so [soylentnews.org]:
Or was that just more hyperbolic bullshit?
No, no, you're not thinking; you're just being logical. --Niels Bohr
(Score: 1, Informative) by Anonymous Coward on Tuesday June 18 2019, @11:37PM
What did aristarchus say this time?