Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
31
1
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
23
24
25
27
28
29
1
2
3
4
Converge where Healthcare meets Innovation
2015-09-02 - 2015-09-03    
All Day
MedCity CONVERGE provides the most accurate picture of the future of medical innovation by gathering decision-makers from every sector to debate the challenges and opportunities [...]
11th Global Summit and Expo on Food & Beverages
2015-09-22 - 2015-09-24    
All Day
Event Date: September 22-24, 2016 Event Venue: Embassy Suites, Las Vegas, Nevada, USA Theme: Accentuate Innovations and Emerging Novel Research in Food and Beverage Sector [...]
2015 AHIMA Convention and Exhibit
2015-09-26 - 2015-09-30    
All Day
The Affordable Care Act, Meaningful Use, HIPAA, and of course, ICD-10 are changing healthcare. Central to healthcare today is health information. It is used throughout [...]
Transforming Medicine: Evidence-Driven mHealth
2015-09-30 - 2015-10-02    
8:00 am - 5:00 pm
September 30-October 2, 2015Digital Medicine 2015 Save the Date (PDF, 1.23 MB) Download the Scripps CME app to your smart phone and/or tablet for the conference [...]
Health 2.0 9th Annual Fall Conference
2015-10-04 - 2015-10-07    
All Day
October 4th - 7th, 2015 Join us for our 9th Annual Fall Conference, October 4-7th. Set over 3 1/2 days, the 9th Annual Fall Conference will [...]
Events on 2015-09-02
Events on 2015-09-22
Events on 2015-09-26
Events on 2015-09-30
Events on 2015-10-04
Latest News

FDA issues cybersecurity alert on GE Healthcare medical devices

FDA issues cybersecurity alert on GE Healthcare medical devices

The U.S. Food and Drug Administration has put out a safety alert concerning GE Healthcare Clinical Information Central Stations and Telemetry Servers, which it says could pose risks to the patients they’re monitoring fda issues cybersecurity alert

FDA issued the safety communication, which concerns cybersecurity vulnerabilities in the devices, following GE Healthcare’s own issuance in November 2019 of a letter informing consumers of the security vulnerabilities in the listed devices, as well as directions to software updates and patches.

The specific security risk concerns a vulnerability within the Clinical Information Central Stations and Telemetry Servers that could allow a hacker to change settings and configurations inside the device, including the ability to silence alarms or otherwise interfere with the patient monitoring capabilities.

“These vulnerabilities might allow an attack to happen undetected and without user interaction,” FDA noted in its communication. “Because an attack may be interpreted by the affected device as normal network communications, it may remain invisible to existing security measures.”

Telemetry servers and clinical information central stations are used mostly in health care facilities for displaying temperature, heartbeat, blood pressure, and other physiologic parameters of a patient.

The listed devices include the ApexPro Telemetry Server and CARESCAPE Telemetry Server running software version 4.2 or earlier, CARESCAPE Central Station (CSCS) version 1 running software 1.x, and CIC Pro Clinical Information Center Central Station version 1, running software versions 4.x and 5.x.

FDA recommends providers work with staff to determine which devices and patients may be affected and take appropriate steps to reduce risk, the agency said, noting that it was thus far unaware of any “adverse events” related to the software vulnerabilities.

GE Healthcare will be issuing a software patch to address the vulnerabilities and will notify affected customers to deploy them when the patches are ready.

In the meantime, the risk posed by the vulnerabilities can be reduced by segregating the network connecting the patient monitors with the GE Healthcare Clinical Information Central Stations and Telemetry Servers from the rest of the hospital network, as described in the GE Healthcare documentation for these devices.

FDA said to use firewalls, segregated networks, virtual private networks, network monitors, or other technologies that minimize the risk of remote or local network attacks.

The safety communication also noted the security risk could be reduced by segregating the devices in question from the rest of the hospital network, as well as through the use of firewalls, virtual private networks and network monitors.

According to research CyberMDX, the common element across these vulnerabilities–beyond the devices they affect and their shared point of discovery–is that they all present a direct path to the device’s compromise, whether by way of illicit control, read, write, or upload capabilities.

Meanwhile, the CEO of third-party risk management specialist Censine, Ed Gaudet, released a statement calling for a fundamental rethink in the way health providers approach risk assessment and third-party medical devices.

“Malicious actors have gotten very good at identifying and exposing weak links in healthcare security,” Gaudet,’s statement noted. “Unfortunately, it’s becoming increasingly common that the weakest link is a third-party medical device.”