<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerabilities in GE HealthCare Anesthesia Machines in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Vulnerabilities-in-GE-HealthCare-Anesthesia-Machines/m-p/24978#M1490</link>
    <description>&lt;P&gt;A research team discovered a &lt;A href="https://www.cybermdx.com/vulnerability-research-disclosures/ge-aestiva-and-ge-aespire" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;vulnerability&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;(pertains to&amp;nbsp;&lt;A href="https://cwe.mitre.org/data/definitions/287.html" target="_blank" rel="noopener"&gt;CWE-287&lt;/A&gt;) related to the GE Healthcare Aestiva and Aespire devices (models 7100 and 7900). If an attacker gains access to a &lt;STRONG&gt;hospital’s network&lt;/STRONG&gt; and if the devices are connected via terminal servers, the attacker can force the device to revert to an earlier, less secure version of the communication protocol and remotely modify parameters without authorization.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When deployed using terminal servers, these manipulations can also be performed without any prior knowledge of IP addresses or location of the anesthesia machine. The attack could lead to:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Unauthorized gas composition input - altering the concentration of inspired/expired oxygen, CO2, N2O, and anesthetic agents.&lt;/LI&gt;&lt;LI&gt;Manipulation of barometric pressure settings and anesthetic agent type selection.&lt;/LI&gt;&lt;LI&gt;Remote silencing of alarms.&lt;/LI&gt;&lt;LI&gt;Alteration of date and time settings.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Here is a link to the &lt;A href="https://www.us-cert.gov/ics/advisories/icsma-19-190-01" target="_blank" rel="noopener"&gt;US-CERT advisory.&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:15:45 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:15:45Z</dc:date>
    <item>
      <title>Vulnerabilities in GE HealthCare Anesthesia Machines</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Vulnerabilities-in-GE-HealthCare-Anesthesia-Machines/m-p/24978#M1490</link>
      <description>&lt;P&gt;A research team discovered a &lt;A href="https://www.cybermdx.com/vulnerability-research-disclosures/ge-aestiva-and-ge-aespire" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;vulnerability&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;(pertains to&amp;nbsp;&lt;A href="https://cwe.mitre.org/data/definitions/287.html" target="_blank" rel="noopener"&gt;CWE-287&lt;/A&gt;) related to the GE Healthcare Aestiva and Aespire devices (models 7100 and 7900). If an attacker gains access to a &lt;STRONG&gt;hospital’s network&lt;/STRONG&gt; and if the devices are connected via terminal servers, the attacker can force the device to revert to an earlier, less secure version of the communication protocol and remotely modify parameters without authorization.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When deployed using terminal servers, these manipulations can also be performed without any prior knowledge of IP addresses or location of the anesthesia machine. The attack could lead to:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Unauthorized gas composition input - altering the concentration of inspired/expired oxygen, CO2, N2O, and anesthetic agents.&lt;/LI&gt;&lt;LI&gt;Manipulation of barometric pressure settings and anesthetic agent type selection.&lt;/LI&gt;&lt;LI&gt;Remote silencing of alarms.&lt;/LI&gt;&lt;LI&gt;Alteration of date and time settings.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Here is a link to the &lt;A href="https://www.us-cert.gov/ics/advisories/icsma-19-190-01" target="_blank" rel="noopener"&gt;US-CERT advisory.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:15:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Vulnerabilities-in-GE-HealthCare-Anesthesia-Machines/m-p/24978#M1490</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:15:45Z</dc:date>
    </item>
  </channel>
</rss>

