Medtronic recalls insulin pump models over cybersecurity risks
advertisement
Current Location:
>
> This Story


Log in or Register to rate this News Story
Forward Printable StoryPrint Comment
advertisement

 

advertisement

 

Infusion Pumps Homepage

Vulnerabilities found in infusion pump firmware Could enable dose or infusion rate manipulation

Beyond the pump — Interoperable infusion systems Trends, insights and best practices from ECRI

Future-ready medical devices - Answering the current and future needs of patients and users

Reducing extravasations in CT contrast-enhanced IV injections Tips and best practices for administering better care

Infusion pumps and long-term IV therapy in the home environment Purchasing insights from the experts at MD Buyline

The future of infusion systems: simplicity, interoperability, and security Insights from George Gray, CTO and VP of research and development for Ivenix

Union Hospital in Ohio achieves two-way smart pump EHR integration Among a small percentage of U.S. hospitals

Infusion pump market evolves to keep up with hospital platform technology trends New standards in performance are significant

MiniMed 508 pump

Medtronic recalls insulin pump models over cybersecurity risks

by John R. Fischer , Staff Reporter
Users of certain Medtronic MiniMed insulin pumps may want to consult their providers about switching to a new model, following the revelation of potential cybersecurity risks.

The Dublin-based healthcare giant is recalling its MiniMed 508 insulin pump and MiniMed Paradigm series insulin pumps for vulnerabilities that they have identified as affecting 4,000 patients across the U.S. No confirmed reports, however, of patient harm related to the risks have been made to date.

Story Continues Below Advertisement

THE (LEADER) IN MEDICAL IMAGING TECHNOLOGY SINCE 1982. SALES-SERVICE-REPAIR

Special-Pricing Available on Medical Displays, Patient Monitors, Recorders, Printers, Media, Ultrasound Machines, and Cameras.This includes Top Brands such as SONY, BARCO, NDS, NEC, LG, EDAN, EIZO, ELO, FSN, PANASONIC, MITSUBISHI, OLYMPUS, & WIDE.



“Medtronic is working closely with industry regulators and researchers to anticipate and respond to potential risks,” Pamela Reese, director of global communications and corporate marketing for Medtronic Diabetes Group, told HCB News. “In addition to our ongoing work with the security community, we have already made several important changes to enhance device security with our newer devices. We will continue to collaborate with industry researchers and regulators to improve device security approaches.”

Discovered in 2011, the issues relate to the wireless communication between Medtronic’s MiniMed insulin pumps and other devices such as blood glucose meters, continuous glucose monitoring systems, the remote controller and CareLink USB device used with these pumps. No software or patch to address these vulnerabilities is available.

Such vulnerabilities could enable people other than the patient, caregiver or health care provider to potentially connect wirelessly to a nearby pump and change its settings to overdose a patient with insulin, leading patients to experience hypoglycemia, or stop insulin delivery, and their experiencing high blood sugar and diabetic ketoacidosis.

In response, the company is offering a program for eligible people to upgrade to a newer insulin pump model or obtain a lower-cost product exchange, and is providing alternative insulin pumps to patients with built-in cybersecurity capabilities. It also has issued letters to patients about the incident and is working with distributor partners and the FDA to identify additional patients potentially using vulnerable pumps.

“As hospitals become increasingly connected, their network-security professionals should keep track of different attack surfaces in their network bounds which, today, include internet communicating machines, internal Ethernet networks and lately, Wi-Fi connected medical devices,” Leon Lerman, CEO and co-founder of security firm Cynerio, said in a statement to HCB News. “Given attackers only need one opening to get in, defenders should deploy solutions that facilitate full control over the whole network. Hospitals also need to make sure they have an up-to-date inventory of all connected devices and models they have on their network.”

Back to HCB News
  Pages: 1

Infusion Pumps Homepage


You Must Be Logged In To Post A Comment