Recurring |
one_organization |
(a) The software failure incident related to vulnerabilities in implantable defibrillators made by Medtronic has happened again within the same organization. The Department of Homeland Security (DHS) issued a medical advisory stating that certain models of Medtronic's implantable defibrillators using the Conexus telemetry system were vulnerable to cyber attacks due to an unsecured protocol used for communication [82238]. Medtronic is working on developing software updates to enhance the security of wireless communication for these devices, with the first update scheduled for later in 2019 [82238].
(b) There is no information in the provided article indicating that a similar software failure incident has happened at other organizations or with their products and services. |
Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the design phase is evident in the vulnerability of certain Medtronic implantable defibrillators due to the use of an unsecured protocol to communicate with other devices. The Department of Homeland Security (DHS) highlighted that the Conexus telemetry protocol used by the devices does not implement authentication or authorization, allowing an attacker with adjacent short-range access to inject, replay, modify, and intercept data within the telemetry communication [82238].
(b) The software failure incident related to the operation phase is demonstrated by the potential risk posed by the vulnerability in the Medtronic devices when they are in use. The vulnerability allows attackers to interfere with and collect sensitive data from the defibrillators, emphasizing the importance of maintaining physical control over home monitors and programmers, using approved devices obtained directly from healthcare providers, and avoiding connecting unapproved devices to the system to minimize risks [82238]. |
Boundary (Internal/External) |
within_system |
(a) within_system: The software failure incident related to the Medtronic defibrillators is primarily within the system. The vulnerability arises from the Conexus telemetry protocol used by the devices, which does not implement authentication or authorization, allowing attackers with adjacent short-range access to interfere with the telemetry communication [82238]. The lack of security measures within the system itself contributes to the software failure incident. |
Nature (Human/Non-human) |
non-human_actions, human_actions |
(a) The software failure incident in this case is primarily due to non-human actions, specifically the vulnerability in the Conexus telemetry protocol used by the Medtronic devices. The Department of Homeland Security highlighted that the protocol lacks authentication or authorization, allowing an attacker with adjacent short-range access to interfere with the telemetry communication [82238].
(b) However, human actions also play a role in this software failure incident as the lack of security in the design of the medical devices, as mentioned by Nadir Izrael, CTO & Co-Founder of Armis, contributes to the vulnerability of these connected devices to malicious actors [82238]. |
Dimension (Hardware/Software) |
hardware, software |
(a) The software failure incident related to hardware: The incident involving Medtronic's implantable defibrillators was due to a vulnerability in the Conexus telemetry system, which is a communication protocol used by the devices. This vulnerability allowed attackers with adjacent short-range access to inject, replay, modify, and intercept data within the telemetry communication, indicating a hardware-related issue [82238].
(b) The software failure incident related to software: The software failure incident was primarily caused by a lack of authentication or authorization in the Conexus telemetry protocol used by the Medtronic devices. This software vulnerability enabled attackers to interfere with and collect sensitive data from the implantable defibrillators, highlighting a software-related flaw in the system [82238]. |
Objective (Malicious/Non-malicious) |
malicious |
(a) The software failure incident related to the Medtronic defibrillators is malicious in nature. The incident involves a vulnerability in the Conexus telemetry protocol used by the devices, which allows an attacker with adjacent short-range access to inject, replay, modify, and intercept data within the telemetry communication. The Department of Homeland Security (DHS) highlighted that the vulnerability only requires a "low skill level" and could potentially lead to interference with and collection of sensitive data from the devices [82238]. Additionally, the article mentions that connected devices in healthcare settings are being targeted by malicious actors, indicating a deliberate intent to exploit vulnerabilities in the system for harmful purposes. |
Intent (Poor/Accidental Decisions) |
poor_decisions |
(a) The software failure incident related to the vulnerability in Medtronic's implantable defibrillators was primarily due to poor decisions. The Department of Homeland Security (DHS) highlighted that the Conexus telemetry protocol used by the devices did not implement authentication or authorization, making it susceptible to attacks by individuals with low skill levels [82238]. This lack of security implementation can be attributed to poor decisions made during the design and development of the software, which left the devices vulnerable to potential cyber threats. |
Capability (Incompetence/Accidental) |
development_incompetence, accidental |
(a) The software failure incident related to development incompetence is evident in the case of the Medtronic defibrillators. The vulnerability in the Conexus telemetry protocol used by the devices was due to the lack of authentication or authorization implementation, as highlighted by the Department of Homeland Security (DHS) advisory [82238]. This lack of professional competence in ensuring secure communication protocols led to the potential for attackers with low skill levels to interfere with and collect sensitive data from the defibrillators.
(b) The accidental aspect of the software failure incident is also present in the case of the Medtronic devices. The vulnerability in the Conexus telemetry system, which allowed for data interception and manipulation, was not intentional but rather a result of the protocol's design flaws and lack of security measures [82238]. This accidental introduction of vulnerabilities made the devices susceptible to cyber threats and potential attacks. |
Duration |
temporary |
The software failure incident reported in the articles is temporary. The vulnerability in the Medtronic defibrillators is due to the use of an unsecured protocol for communication, specifically the Conexus telemetry system, which lacks authentication and authorization. Medtronic is actively working on developing software updates to improve the security of wireless communication, with the first update scheduled for later in 2019 [82238]. |
Behaviour |
value, other |
(a) crash: The software failure incident in the article is not related to a crash where the system loses state and does not perform any of its intended functions. The vulnerability in the Medtronic defibrillators allows attackers to interfere with and collect sensitive data from the devices, indicating that the system is still operational but compromised [82238].
(b) omission: The software failure incident is not related to an omission where the system omits to perform its intended functions at an instance(s). The vulnerability in the Medtronic devices does not involve the system failing to perform its functions but rather being susceptible to unauthorized interference [82238].
(c) timing: The software failure incident is not related to timing issues where the system performs its intended functions correctly but too late or too early. The vulnerability in the Medtronic devices does not involve timing-related failures but rather a security flaw in the communication protocol [82238].
(d) value: The software failure incident is related to a value failure where the system performs its intended functions incorrectly. The vulnerability in the Medtronic defibrillators allows attackers to inject, replay, modify, and intercept data within the telemetry communication, indicating that the system is not functioning as intended in terms of data security [82238].
(e) byzantine: The software failure incident is not related to a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. The vulnerability in the Medtronic devices does not involve inconsistent responses but rather a clear security vulnerability that can be exploited by attackers [82238].
(f) other: The software failure incident is related to a security vulnerability in the communication protocol of the Medtronic defibrillators. The flaw in the Conexus telemetry system used by the devices does not implement authentication or authorization, allowing attackers with short-range access to interfere with the data communication [82238]. |