- Six AI Predictions For 2025 That Will Reshape How We Think About Enterprise Technology
- Linux Foundation's L3AF brings zero-downtime updates to eBPF network management
- This cheap USB power meter is shockingly accurate - and I highly recommend it
- The Linux tool you forgot about: How Synaptic makes software installation a breeze
- Magnify your screen and more with PowerToys' new ZoomIt tool - here's how
CISA Warns of Backdoor Vulnerability in Contec Patient Monitors
A hidden backdoor function embedded in the firmware of the Contec CMS8000 patient monitor has been identified by the US Cybersecurity and Infrastructure Security Agency (CISA).
The vulnerability, which includes a hard-coded IP address and the potential for unauthorized access to patient data, exists in all analyzed versions of the device’s firmware.
The Contec CMS8000 is widely used in healthcare facilities across the US and European Union to monitor vital signs, including electrocardiograms (ECGs), heart rate, blood oxygen levels and other critical patient metrics.
Backdoor in Medical Monitors Could Disrupt Patient Care
CISA’s analysis determined the backdoor could allow remote code execution (RCE) and device modifications. If exploited, the vulnerability could disrupt monitoring functions and potentially lead to improper responses to patient vitals.
The backdoor function enables the device to download and execute remote files without verification, bypassing standard update security mechanisms.
The discovery follows reports from an independent security researcher who flagged unusual network activity. Upon further analysis, CISA confirmed that the monitor was attempting to connect to an IP address registered to a third-party university.
CISA found that patient data is automatically transmitted to the same hard-coded IP address upon device startup.
This transmission occurs via port 515, commonly associated with the Line Printer Daemon (LPD) protocol rather than a standard health data protocol. The lack of encryption and logging for these transmissions heightens the risk of sensitive patient information being accessed by unauthorized entities.
Despite vendor-supplied firmware updates, including Version 2.0.8, CISA confirmed that the backdoor function remains present. Although some mitigations were attempted – such as disabling certain network interfaces – the fundamental security risks persist.
However, cybersecurity firm Claroy said the reality of the backdoor is more complicated than it may first appear.
After investigating the firmware of the CMS8000, Claroy’s researchers, Team82, said is most likely not a hidden backdoor, but instead an insecure/vulnerable design that introduces great risk to the patient monitor users and hospital networks.
“Absent additional threat intelligence, this nuance is important because it demonstrates a lack of malicious intent, and therefore changes the prioritization of remediation activities. Said differently, this is not likely to be a campaign to harvest patient data and more likely to be an inadvertent exposure that could be leveraged to collect information or perform insecure firmware updates,” the Team82 researchers said.
Recommendations for Healthcare Providers
CISA and the Food and Drug Administration (FDA) urged healthcare providers to take the following actions:
-
Disable remote monitoring features
-
Disconnect affected devices from network access
-
Seek alternative patient monitors if offline use is not an option
The FDA said they are not aware of any reported cybersecurity incidents linked to this vulnerability but advises facilities to remain vigilant and report any abnormalities.