Supply Chain Council of European Union | Scceu.org
Technology

Medical device makers race to understand scope of SweynTooth vulnerabilities

Medical-technology companies are working quickly to assess the cybersecurity of their health care devices following public disclosure this week of a suite of serious security problems in common low-energy Bluetooth communication systems.

Millions of devices, including many medical devices, could be hacked and shut down because of flaws in low-power versions of the ubiquitous wireless communications technology, researchers at the Singapore University of Technology and Design disclosed in a paper last month.

The report documented at least 12 different vulnerabilities that it collectively dubbed SweynTooth (pronounced “swain-tooth”), specifically calling out medical devices from Medtronic and VivaChek Biotech as being vulnerable.

Other companies’ products may also be affected, but the work of assessing SweynTooth’s impacts across med-tech is ongoing. As of today, the Food and Drug Administration cannot issue a full list of affected devices, because no such list exists — it’s up to each manufacturer to assess impacts and decide if software patches are needed. The FDA announcement simply listed three common types of medical devices that could potentially be affected: pacemakers, glucose monitors and ultrasound devices.

Medtronic, run from offices in Minnesota, has confirmed some of its heart and diabetes devices are impacted, while GE Healthcare in Wisconsin said its ultrasound systems are not. Heart-device maker Boston Scientific has found no effects from SweynTooth. Abbott Laboratories is continuing to evaluate its products, but so far has detected no impacts for most of its devices, including the widely used FreeStyle Libre glucose monitor. China-based VivaChek Biotech is testing a software patch for affected blood-glucose meters that it plans to released by March 13.

No malicious attacks have been reported using the SweynTooth vulnerabilities, but the software tools are reportedly available online. Regulators said the vulnerabilities could allow an attacker to crash a vulnerable device or change its therapy settings. The researchers who discovered vulnerabilities warned that quick action is needed to avoid low-energy Bluetooth communications turning into a “breeding ground” for attackers.

Interviews with industry officials this week show that information about the vulnerabilities diffused informally though the med-tech community throughout February. FDA officials briefed medical device company officials at an industry meeting in February, and FDA’s formal public announcement arrived on Tuesday. Wired magazine covered the story on Feb. 20.

The problems reside in complex electronic devices called “systems on a chip,” or SoCs, made by large electronics manufacturers like Texas Instruments and Cypress NXP.

Ken Hoyme, director of product security at Boston Scientific, said that while the chip companies received advance notice about publication of the vulnerabilities, it’s not clear that those manufacturers told their customers, including med-tech manufacturers.

The SweynTooth report disclosed that Medtronic buys Bluetooth Low Energy chips from Dialog Semiconductor in London. Dialog was informed of the vulnerabilities by the researchers, but Medtronic said it did not inform the device maker.

“We did not hear this from Dialog. However, we have been in regular communication with Dialog on the vulnerability,” said Alex Kent, a director with Medtronic’s product security and privacy division for heart devices.

Dialog did not respond to a request for comment.

Communication in the medical device supply chain ought to include newly discovered security vulnerabilities, said Beau Woods, CEO of information security consulting firm Stratigos Security. “In theory, when any of your supply chain finds out about an issue like that, they are supposed to tell you. In some cases they do, in some cases they delay, and sometimes they don’t bother,” Woods said.

Medtronic officials began testing for SweynTooth problems after learning about the vulnerabilities on Feb. 14. They found that their strategy of “defense by design” worked, because the devices keep working even if the Bluetooth connection is disrupted.

Two aspects of the defensive design Medtronic was willing to talk about publicly were its “zero trust” architecture and segmentation of functions: Inside a Medtronic heart device, the low-energy Bluetooth components are kept separate from the therapy module that interacts with the heart, and the therapy module can’t take orders from Bluetooth components.

“You can’t interrupt the functionality of the device through these or any other vulnerabilities in the Bluetooth module,” Kent said.

Medtronic issued a security alert this week saying there are no plans to issue firmware updates for heart devices, but no decision has yet been made about diabetes devices. SweynTooth affects several models of pacemakers and defibrillators, and several components of its diabetes systems, but no Medtronic insulin pumps or continuous glucose monitor transmitters.

Bluetooth technology has long been known to be susceptible to attacks, according to a 2017 standards document from the National Institute of Standards and Technology.

“The medical device industry is under tremendous pressure,” said Todd Carpenter, chief engineer at Minneapolis information security firm Adventium Labs. “Clinicians want things that are easy to use, that automatically work. And Bluetooth is set up so that it just automatically works. The downside is, that means its also automatically works for the attackers.”

rn{% endblock %}"},"start":"https://users.startribune.com/placement/1/environment/3/limit-signup-optimizely/start"},{"id":"limit-signup","count":12,"action":"ignore","mute":true,"action_config":{"template":"{% extends "grid" %}rnrn{% block heading_text %}Youu2019ve read your 10 free articles for this 30 day period. Sign up now for local coverage you wonu2019t find anywhere else, special sections and your favorite columnists. StarTribune puts Minnesota and the world right at your fingertips. {% endblock %}rnrn{% block last %}rn{{ parent() }}rn{# limit Krux pixel from https://www.squishlist.com/strib/customshop/328/ #}rnrnrn{% endblock %}"},"start":"https://users.startribune.com/placement/1/environment/3/limit-signup/start"},{"id":"meter-desktop-331","count":10,"action":"ignore","mute":false,"action_config":false,"start":"https://users.startribune.com/placement/1/environment/3/meter-desktop-331/start"},{"id":"PDA991499opt","count":9,"action":"ignore","mute":true,"action_config":false,"start":"https://users.startribune.com/placement/1/environment/3/PDA991499opt/start"},{"id":"limit","count":8,"action":"inject","mute":false,"action_config":{"template":"

rnrnrnrn

rn

rn

rn rn

rn t

rn SUBSCRIBErn Already a subscriber? Log in.rn

rn

All Star Tribune readers without a Digital Access subscription are given a limited number of complimentary articles every 30 days. Once the article limit is reached we ask readers to purchase a subscription including Digital Access to continue reading. Digital Access is included in all multi-day paper home delivery, Sunday + Digital, and Premium Digital Access subscriptions. After the 1 month Premium Digital Access introductory period you will be charged at a rate of $14.99 per month. You can see all subscription options or login to an existing subscription herern

rn rn

rn

rn

rn

rn

rn"},"start":"https://users.startribune.com/placement/1/environment/3/limit/start"},{"id":"nag","count":7,"action":"lightbox","mute":true,"action_config":{"height":null,"width":"630px","redirect_on_close":null,"template":"{% extends "shell" %}rnrn{% block substyles %}rn

rn{% endblock %}rnrn{% block page %}rn{#rnrn{{ limit - count - 1 }}rnrn{{ form.flow_form_open({nextAction: 'firstSlide'}, null, null, '_top') }}rn {{ form.btn('Save Now') }}rn{{ form.flow_form_close() }}rnrn

rnrnrnu2022 rnrnrnrn#}rn

rn

rn

You have {{ limit - count - 1 }} articles left

rn

rn rn u00a0u00a0u2022u00a0u00a0rn rn

rn

rn

rn

rn Save More Todayrn

Over 70% off!

rn

rn

rn

rn

99u00a2 for first 4 weeks

rn {{ form.flow_form_open({nextAction: 'firstSlide'}, null, null, '_top') }}rn {{ form.button('Save Now', 'btn nag-btn') }}rn {{ form.flow_form_close() }}rn

rn

rn{% endblock %}rnrn{% block last %}rn{{ parent() }}rnrn{% endblock %}"},"start":"https://users.startribune.com/placement/1/environment/3/nag/start"},{"id":"x","count":4,"action":"ignore","mute":true,"action_config":false,"start":"https://users.startribune.com/placement/1/environment/3/x/start"},{"id":"multi-start","count":3,"action":"fly_in","mute":true,"action_config":{"location":"bottom_left","slide_direction":"bottom","group_id":null,"display_delay":"0","collapse_delay":"10","template":"

rn

rn

rn

rn u00d7rn

rn

rn

From just

rn

$3.79 99u00a2 a week

rn Save nowrn

rn

rn

"},"start":"https://users.startribune.com/placement/1/environment/3/multi-start/start"}]};

Related posts

Govt readies IT systems for Australia’s Covid-19 vaccine rollout – Strategy – Software – Storage

scceu

Global Database Automation Systems Market Size And Forecast

scceu

Procure-to-Pay Suites Market 2020 Global Industry Share, Size,

scceu