
Appreciating the various types of dispensing cabinets and associated vulnerabilities
Consider vulnerabilities that can be exploited remotely and the level of skil required to execute exploitation.
Earlier this month, I wrote an
In order to further clarify vulnerabilities associated with ADCs, I drew on my past experiences as an operating room aide, a dietary aide, and a spinal implant sales representative, where I saw various types of ADCs utilized on a daily basis. First, let’s look at the cabinets that are similar to ADCs, but dispense items other than medications. For example,
Having established that an ADC or other supply management platform should be part of any risk analysis, there are some key items to focus on. First, consider vulnerabilities that can be exploited remotely. Second, look at the level of skill required to exploit the vulnerability. Next, look at the adequacy of policies and procedures. Finally, assess the various technical, administrative and physical safeguard requirements of the Security Rule in relation to prevention, detection and correction.
Trending:
Here are some specific examples, which the Department of Homeland Security (“DHS”) noted as being problematic for BD:
ICS Medical Advisory (ICSMA-19-248-01) – “BD reports this vulnerability was remediated in the latest software release; however, BD has been unsuccessful in reproducing this issue since initially testing and reproducing it earlier in the year [2019].”
ICS Advisory (ICSMA-18-114-10) – a crucial vulnerability, “reusing a Nonce” was discovered to affect a variety of BD products (e.g., BD Pyxis Anesthesia ES, BD Pyxis MedStation ES and BD Pyxis Supply Station). A “nonce” is a “number used once.” Reusing a nonce causes a person to lose confidentiality for the message or transmission.
ICS Advisory (ICSA-14-288-01) – an independent researcher identified authentication vulnerabilities in CareFusion’s Pyxis SupplyStation; yet, BD only mitigated some of these issues. “The Pyxis SupplyStation system contains a hard-coded service password that grants administrator privileges by default. A remote attacker may be able to compromise the device if an attacker is able to defeat the network and/or physical security of the facility in which the SupplyStation system is deployed. Physical access to the device is required to remove contents of the automated supply cabinet.”
Additionally, in 2016,
Read More:
The take-aways from this article and the article published earlier this month cannot be stressed enough. Many covered entities and business associates overlook automated dispensing machines as part of their risk analysis, despite the knowledge that cybercriminals are looking for ways to exploit vulnerabilities in the healthcare sector. In light of COVID-19 and the increase of cyberattacks, the need for an adequate risk analysis, as well as policies and procedures and related controls is crucial.
Newsletter
Optimize your practice with the Physicians Practice newsletter, offering management pearls, leadership tips, and business strategies tailored for practice administrators and physicians of any specialty.














