Backdoor in surveillance monitor classified as vulnerability

B2B Cyber ​​Security ShortNews
Advertising

Share post

On January 30, the U.S. cybersecurity agency CISA published an alert about a backdoor in medical monitoring monitors, which was supplemented by a notification from the U.S. Food and Drug Administration (FDA).

According to the report, the Chinese-made Contec CMS8000 medical monitoring monitor and OEM white-label variants contain a backdoor that communicates with a Chinese IP address. Security researchers at Team82, the research division of cyber-physical systems (CPS) security specialist Claroty, examined the firmware and concluded that it is most likely NOT a hidden backdoor, but an insecure/vulnerable design that poses a major risk to patient monitor users and hospital networks.

Advertising
Perfect SME cybersecurity
How small and medium-sized enterprises defend against AI-led attacks with tailored security

Medical monitoring monitor with firmware leak

This assumption is supported by the fact that the manufacturer and resellers list the relevant IP address in their manuals and instruct users to configure the Central Management System (CMS) with this IP address on their internal networks. This is therefore likely not a campaign to intercept patient data, but rather an unintended compromise that could be used by cybercriminals to collect information or perform insecure firmware updates. Nevertheless, the vulnerability should be remedied as a priority.

Expert recommendations

  • It is strongly recommendedthat companies using this patient monitor block any access to the 202.114.4.0/24 subnet from their internal network. This can prevent the devices from attempting to update their firmware from a WAN server or transfer sensitive data.
  • On some OEM models of the CONTEC CMS8000 it is possible to change the default network configuration of the CMS. If this is possible, the default IP address 202.114.4.119 should not be used.
  • If you are stuck on the hard-coded IIf you rely on the P-address 202.114.4.119 for monitoring and updates, security experts recommend using static routes and/or network segmentation to ensure that this traffic is only directed to your own CMS and not outwards.
  • If the HL7 functionality of the patient monitor, all outgoing network traffic to 202.114.4.120 should be blocked to prevent possible data leakage.
More at Claroty.com

 


About Claroty

Claroty, the Industrial Cybersecurity Company, helps its global customers discover, protect and manage their OT, IoT and IIoT assets. The company's comprehensive platform can be seamlessly integrated into customers' existing infrastructure and processes and offers a wide range of industrial cybersecurity controls for transparency, threat detection, risk and vulnerability management and secure remote access - with significantly reduced total cost of ownership.


 

Matching articles on the topic

MITRE CVE program remains in place for the time being

The CVE program, funded by the US government, is considered a crucial component in the global detection of software flaws. Now, funding is to be temporarily suspended. ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

F5 BIG-IP: BSI warns of highly dangerous vulnerabilities

The BSI has issued a warning about F5 products, as they contain several highly dangerous security vulnerabilities that should be closed. The BIG-IP ➡ Read more

Iran, North Korea, Russia: State hackers rely on ClickFix 

State-sponsored hacker groups are increasingly adopting new social engineering techniques originally developed by commercially motivated cybercriminals. ClickFix, for example, is now increasingly ➡ Read more

TA4557: Venom Spider targets HR departments

TA4557, better known as Venom Spider, is increasingly exploiting phishing and trying to deploy its backdoor malware. The focus of the ➡ Read more

Oettinger Brewery attacked by ransomware

The APT group Ransomhouse claims to have successfully attacked the German brewery Oettinger with ransomware. On the APT group's leak page ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Healthcare facilities: 90 percent are at high risk

The current report “State of CPS Security: Healthcare Exposures 2025” shows the most dangerous vulnerabilities of medical devices in networks of ➡ Read more