• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 27th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
Microsoft

Siemens medical scanner on Windows 7 vulnerable; patch coming soon

August 8th, 2017 Uzair Amir Security, Microsoft, Technology News 0 comments
Siemens medical scanner on Windows 7 vulnerable; patch coming soon
Share on FacebookShare on Twitter

German Firm Siemens will Update PET Scanner Software as DHS Issues Security Threat to Machines.

Cyber-attacks on medical equipment are intensifying every passing day. The latest to join the list of unsecured medical equipment is the Positron Emission Tomography scanners or PET scanners manufactured by the Munich based company Siemens.

These scanners require Microsoft Windows 7 to run and their purpose is to reveal the functioning of tissues and organs. This is done with the help of a radioactive drug that traces the activities of these tissues/organs. PET scanners are used to diagnose cancerous cells, brain diseases, and cardiac disorders.

Siemens medical scanner on Windows 7 vulnerable; patch coming soon

A PET scanner

Reportedly, Siemens has identified (Pdf) security flaws in these scanners, and it is believed that cybercriminals can remotely exploit the device. The company initially informed its customers including hospitals to immediately disconnect the scanners and wait for an update, which is due to be released soon. However, further review revealed that disconnecting the scanners was not necessary because patients were not at risk.

“To date, there have been no reports of exploitation of the identified vulnerabilities on any system installation worldwide,” said a spokesperson of Siemens.

Siemens used the Common Vulnerability Scoring System (CVSS), which is an open industry standard risk assessment system and concluded that the vulnerability’s security severity ranking was 9.8/10.

[fullsquaread][/fullsquaread]

It is worth noting that imaging machines like the PET scanners don’t have to be directly connected to the internet to function. Instead, these require being connected to the clinical IT system. If the system is infected, then the machine will also receive the impact of infection.

Graham Cluley, an independent computer security analyst, states that the problem is quite serious because the vulnerabilities in medical equipment can be exploited remotely. He further claimed that hospitals were poorly protected against hacking probably because of two reasons: underfunding and old equipment that is not compatible with advanced operating systems.

The German industrial firm Siemens is, therefore, likely to issue software update by the end of this month to fix the vulnerability that would lead to hacking of PET scanners.

The US Department of Homeland Security notified companies about the possibility of a hack attack on medical equipment running on Windows 7 by a “low skill” hacker. The warning notice released last week read:

“An attacker with a low skill would be able to exploit these vulnerabilities.”

The attacker supposedly will use vulnerabilities existing in older versions of MS Windows.

According to Siemens’ spokesperson, as of now, there is no evidence of an attack on its devices. Still, the company’s decision to fix the flaw through a patch is evidence of the increasing focus on thwarting cyber-attacks on medical equipment.


  • Tags
  • Bug
  • Cyber Attack
  • Flaw
  • hacking
  • internet
  • Medical
  • Microsoft
  • Science
  • security
  • Technology
  • Windows
Facebook Twitter LinkedIn Pinterest
Previous article Flaws in ISP gateways let attackers remotely tap internet traffic
Next article HBO hackers leak Game of Thrones Stars data; demand multimillion dollar ransom
Uzair Amir

Uzair Amir

I am an Electronic Engineer, an Android Game Developer and a Tech writer. I am into music, snooker and my life motto is 'Do my best, so that I can't blame myself for anything.'

Related Posts
TikTok vulnerability allowed hackers to access users' phone numbers

TikTok vulnerability allowed hackers to access users' phone numbers

Watch out as new Android malware spreads through WhatsApp

Watch out as new Android malware spreads through WhatsApp

SonicWall hacked after 0-day flaws exploited by hackers

SonicWall hacked after 0-day flaws exploited by hackers

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
TikTok vulnerability allowed hackers to access users' phone numbers
Security

TikTok vulnerability allowed hackers to access users' phone numbers

54
Why you should never use free a VPN
Drones

Why you should never use free a VPN

46
Watch out as new Android malware spreads through WhatsApp
Security

Watch out as new Android malware spreads through WhatsApp

412

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us