Go to listing page

Access:7 - Supply Chain Flaws Impacting IoT and Medical Devices

Access:7 - Supply Chain Flaws Impacting IoT and Medical Devices
Healthcare devices, including imaging tools and diagnostic lab equipment, are most often left inadequately secure on hospital networks. A set of vulnerabilities have been found in PTC’s Axeda agent that can affect such devices. 

Diving into details

The seven flaws have been dubbed Access:7 and are present in PTC’s Axeda agent, which is used for remote access and management of more than 150 connected devices across over 100 vendors. 
  • Three of the security flaws have been rated critical, with a score of at least 9.4. They could be abused for RCE on devices running an outdated Axeda agent version.
  • While Axeda has been phased out to be replaced with ThingWorx, the former is still in use in several sectors on 2,000 unique devices.

Why this matters

  • In the case of medical devices, even less critical vulnerabilities can have a substantial impact
  • An attacker gaining read access by abusing CVE-2022-25249 could exfiltrate PHI or diagnostics and sell it on a profit.
  • Exploiting CVE-2022-25250 could shut down the platform, rendering remote service impossible.  
  • Exploiting CVE-2022-25246 could enable the attacker to leverage the VNC connection to modify medical information. Furthermore, they can leverage this to insert malicious code to gain persistence on the network.

Possible attack vectors 

Provided the nature of the healthcare sector, the attackers have several attack vectors to gain initial access.
  • The facilities are accessible to the public, with various network sockets and connected devices with physical access. With inadequate segmentation, adversaries can access the internal operational network via a guest WiFi network. 
  • The medical staff can be lured to give up initial access by phishing through easily obtainable email addresses.
  • IT systems can have bugs that lead adversaries to operational networks. They can access the internal network in places with insufficient segmentation with a sharing system or internet portal.

The bottom line

Complete protection against Access:7 necessitates patching devices running vulnerable versions of Axeda agents. PTC has already released official patches and device manufacturers should provide their own updates to customers. In addition to this, implementing segmentation controls and appropriate network hygiene to reduce the risk from vulnerable devices is key.

Cyware Publisher

Publisher

Cyware