The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) includes the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), whose mission is to guide a cohesive effort between government and industry to improve the cyber security posture of control systems within the nation’s critical infrastructure. NCCIC/ICS-CERT assists control systems vendors and asset owners/operators to identify security vulnerabilities and develop sound mitigation strategies that strengthen their cyber security posture and reduce risk.
As a functional component of the NCCIC, the ICS-CERT is a key component of DHS’s Strategy for Securing Control Systems. The primary goal of the strategy is to build a long-term common vision where effective risk management of control systems security can be realized through successful coordination efforts including, but not limited to providing situational awareness in the form of actionable intelligence, coordinating the responsible disclosure of vulnerabilities and associated mitigations, and sharing and coordinating vulnerability information and threat analysis through information products and alerts.
Advisories provide timely information about current security issues, vulnerabilities, and exploits. A complete list of all ICS-CERT Advisories by Vendor can be viewed at: https://ics-cert.us-cert.gov/advisories-by-vendor.
An ICS-CERT Alert is intended to provide timely notification to critical infrastructure owners and operators concerning threats or activity with the potential to impact critical infrastructure computing networks. A complete list of all ICS-CERT Alerts by Vendor can be viewed at: https://ics-cert.us-cert.gov/alerts-by-vendor.
The MDSISC is engaged with networks of hospitals and manufacturers in the medical device security arena to develop solutions, identify best practices, and facilitate the sharing and exchange of information that will result in a more efficient and secure use of medical devices and related practices.
Alerts and Advisories
The following links are being provided as a “one-stop shopping” capability for all calendar year 2017 published Alerts and Advisories that are general rather than specific to ransomware outbreaks impacting medical devices (e.g., Petya and Wanna Cry pages). The Petya and Wanna Cry alerts and advisories will continue to be posted to those pages on the MD-VIPER website. Links and relevant information will be posted as they are made available.
|COMMUNICATION TYPE||REFERENCE #||TOPIC||LINK|
|Medical Advisory||ICSMA-17-332-01||Ethicon Endo-Surgery Generator G11 Vulnerability||https://ics-cert.us-cert.gov/advisories/ICSMA-17-332-01|
|Medical Advisory||ICSMA-17-318-01||Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability||https://ics-cert.us-cert.gov/advisories/ICSMA-17-318-01|
|Medical Advisory||ICSMA-17-017-02A||BD Alaris 8015 Insufficiently Protected Credentials Vulnerabilities (Update A)||https://ics-cert.us-cert.gov/advisories/ICSMA-17-017-02A|
|Medical Advisory||ICSMA-17-292-01||Boston Scientific ZOOM LATITUDE PRM Vulnerabilties||https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01|
|Medical Advisory||ICSMA-17-255-01||Philips’ IntelliVue MX40 Patient Worn Monitor (WLAN) Vulnerabilities||https://ics-cert.us-cert.gov/advisories/ICSMA-17-255-01|
|Medical Advisory||ICSMA-17-250-01||i-SENS, Inc. SmartLog Diabetes Management Software||https://ics-cert.us-cert.gov/advisories/ICSMA-17-250-01|
|Medical Advisory||ICSMA-17-250-02||Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump Vulnerabilities||https://ics-cert.us-cert.gov/advisories/ICSMA-17-250-02|
|Medical Advisory||ICSMA-17-241-01||Abbott Laboratories’ Accent/Anthem, Accent MRI, Assurity/Allure, and Assurity MRI Pacemaker Vulnerabilities||https://ics-cert.us-cert.gov/advisories/ICSMA-17-241-01|
|FDA Safety Communication||ucm573669.htm||Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott’s (formerly St. Jude Medical’s) Implantable Cardiac Pacemakers||https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm|
|Updated Advisory||ICSA-17-129-01E||Siemens devices using the PROFINET Discovery and Configuration Protocol (Update E)||https://ics-cert.us-cert.gov/advisories/ICSA-17-129-01E|
|Updated Advisory||ICSA-17-129-02C||Siemens devices using the PROFINET Discovery and Configuration Protocol (Update C)||https://ics-cert.us-cert.gov/advisories/ICSA-17-129-02C|
|Medical Advisory||ICSMA-17-229-01||Philips’ DoseWise Portal Vulnerabilities||https://ics-cert.us-cert.gov/advisories/ICSMA-17-229-01|
|Medical Advisory||ICSMA-17-227-01||BMC Medical and 3B Medical Luna CPAP Machine||https://ics-cert.us-cert.gov/advisories/ICSMA-17-227-01|
|Medical Advisory||ICSMA-17-215-01||Siemens Molecular Imaging Vulnerabilities||https://ics-cert.us-cert.gov/advisories/ICSMA-17-215-01|
|Medical Advisory||ICSMA-17-215-02||Siemens Molecular Imaging Vulnerabilities||https://ics-cert.us-cert.gov/advisories/ICSMA-17-215-02|
|Medical Advisory||ICSMA-17-082-02||B. Braun Medical SpaceCom Open Redirect Vulnerability||https://ics-cert.us-cert.gov/advisories/ICSMA-17-082-02|
|Medical Advisory||ICSMA-17-082-01||BD Kiestra PerformA and KLA Journal Service Applications Hard-Coded Passwords Vulnerability||https://ics-cert.us-cert.gov/advisories/ICSMA-17-082-01|
|ICS-CERT Alert||ICS-ALERT-17-102-01A||BrickerBot Permanent Denial-of-Service Attack (Update A)||https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-102-01A|
|Medical Device Alert||ICS-ALERT-17-089-01||Miele Professional PG 8528 Vulnerability||https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-089-01|
|Medical Advisory||ICSMA-17-017-01||BD Alaris 8000 Insufficiently Protected Credentials Vulnerability||https://ics-cert.us-cert.gov/advisories/ICSMA-17-017-01|
|Medical Advisory||ICSMA-17-017-02||BD Alaris 8015 Insufficiently Protected Credentials Vulnerabilities||https://ics-cert.us-cert.gov/advisories/ICSMA-17-017-02|
|Medical Advisory||ICSMA-17-009-01A||St. Jude Merlin@home Transmitter Vulnerability (Update A)||https://ics-cert.us-cert.gov/advisories/ICSMA-17-009-01A|