Incident: Security Vulnerabilities in B. Braun Infusion Pump System

Published Date: 2021-08-24

Postmortem Analysis
Timeline 1. The software failure incident involving the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation happened between 2005 and 2009, as during this period, the FDA received roughly 56,000 reports of adverse events related to infusion pumps, including numerous injuries and deaths [117821]. 2. The incident was also mentioned to have been uncovered by German government researchers at the end of last year, which implies the incident was discovered in late 2020 [117821]. Therefore, the software failure incident likely occurred between 2005 and 2009 and was uncovered in late 2020.
System 1. B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation [117821]
Responsible Organization 1. Researchers from the security firm McAfee Enterprise [117821]
Impacted Organization 1. Patients receiving medication from the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation [117821]
Software Causes 1. Lack of access controls between the SpaceStation and the pump, allowing an attacker to interact between the two systems and manipulate medication delivery [117821]. 2. Vulnerabilities in the software that allowed for privilege escalation, viewing sensitive information, uploading arbitrary files, and performing remote code execution [117821]. 3. Lack of upload restrictions, enabling attackers to taint device backups with malicious files and restore them onto pumps [117821]. 4. Sending data back and forth in plaintext without encryption, exposing it to interception or manipulation [117821].
Non-software Causes 1. Lack of proper access controls between the SpaceStation and the pump, allowing an attacker to move back and forth between the two systems [117821]. 2. Vulnerabilities in the networking feature of the B. Braun Infusomat Space Large Volume Pump and SpaceStation, which could be exploited by hackers [117821]. 3. Lack of encryption for data transmission between the devices, exposing it to interception or manipulation [117821]. 4. Insufficient verification of data integrity and authentication of commands sent from the SpaceStation to the pump [117821].
Impacts 1. The software failure incident involving the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation allowed a determined hacker to manipulate the devices to administer a double dose of medication to victims, posing a serious risk to patient safety [117821]. 2. The vulnerabilities in the infusion pump and dock could allow a sophisticated attacker to compromise the security of the devices, escalate privileges, view sensitive information, upload arbitrary files, perform remote code execution, and change the connected infusion pump's configuration, including the rate of infusions [117821]. 3. The software failure incident exposed flaws in the lack of access controls between the SpaceStation and the pump, inadequate verification of data integrity, lack of authentication for commands, unrestricted upload capabilities leading to malware injection, and plaintext data transmission without encryption, all of which could be exploited by attackers [117821]. 4. The potential impacts of the software failure incident included the risk of ransomware attacks on hospital networks, which could disrupt services and potentially harm patients, highlighting the urgent need for improved security measures for medical devices [117821].
Preventions 1. Regular software updates and patching to ensure devices are running the latest secure versions of software [117821]. 2. Implementation of network security mitigations like segmentation and multifactor authentication to prevent unauthorized access [117821]. 3. Improved access controls between the SpaceStation and the pump to prevent unauthorized commands and data manipulation [117821].
Fixes 1. Implementing the latest versions of B. Braun software released in October [117821]. 2. Implementing network security mitigations like segmentation and multifactor authentication [117821].
References 1. McAfee Enterprise researchers [117821] 2. B. Braun [117821] 3. German government researchers [117821] 4. FDA [117821]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident related to security vulnerabilities in medical devices, specifically the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation, highlights a concerning issue within the same organization. The incident involving these devices being vulnerable to manipulation by hackers to administer a double dose of medication is a significant security flaw that poses risks to patient safety [117821]. (b) The article does not provide specific information about similar incidents happening at other organizations or with their products and services.
Phase (Design/Operation) design, operation (a) The software failure incident in the article is related to the design phase. The vulnerabilities in the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation were found by researchers from the security firm McAfee Enterprise who were able to manipulate the devices to administer a double dose of medication to victims. They found ways to get around the security barriers that were supposed to prevent direct commands to the devices, ultimately showing that they could double the rate of flow by exploiting vulnerabilities in the system design [117821]. (b) The software failure incident is also related to the operation phase. The attack scenario that the researchers described as realistic and feasible for an attacker to carry out involved exploiting vulnerabilities in the operation of the devices. Once hackers gained control of the SpaceStation, they could seed ransomware or other malware from it to devices across a hospital's network, impacting the operation of the medical facility [117821].
Boundary (Internal/External) within_system (a) The software failure incident related to the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation was primarily within the system. Researchers from McAfee Enterprise found ways to manipulate the infusion pump and dock by exploiting vulnerabilities within the devices themselves. They were able to breach the security boundary between the SpaceStation and the pump operating system, allowing them to send commands to administer a double dose of medication [117821]. The vulnerabilities discovered included lack of access controls, lack of data integrity verification, lack of command authentication, lack of upload restrictions, and plaintext data transmission without encryption, all of which were internal to the system and not due to external factors.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation was primarily due to non-human actions. Researchers from the security firm McAfee Enterprise found ways to exploit vulnerabilities in the devices, allowing a determined hacker to manipulate the infusion pump to administer a double dose of medication to victims. The vulnerabilities included common connectivity vulnerabilities, lack of access controls between the SpaceStation and the pump, lack of data integrity verification, lack of command authentication, lack of upload restrictions, and plaintext data transmission without encryption. These non-human factors introduced by the software design and implementation allowed for the potential compromise of the devices' security and functionality [117821]. (b) However, human actions were also involved in the incident. The McAfee researchers noted that most of the identified vulnerabilities had not been patched in existing products, and B. Braun had to remove the vulnerable networking feature in the new version of its SpaceStations. The company recommended customers to use the latest software versions and implement network security mitigations like segmentation and multifactor authentication to enhance security. Additionally, the researchers highlighted that malicious hackers would need to be skilled and well-resourced reverse engineers to develop such an attack, indicating the potential role of human expertise in exploiting the vulnerabilities [117821].
Dimension (Hardware/Software) hardware, software (a) The software failure incident in the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation was primarily due to contributing factors originating in hardware. The security vulnerabilities in these medical devices allowed a determined hacker to manipulate the infusion pump to administer a double dose of medication to patients [117821]. (b) The software failure incident also had contributing factors originating in software. Researchers from McAfee Enterprise found ways to exploit vulnerabilities in the software of the B. Braun devices, allowing them to take control of the SpaceStation and manipulate the connected infusion pump's configuration, including changing the rate of infusions. The vulnerabilities were related to lack of access controls, inadequate data verification, lack of upload restrictions, and plaintext data transmission without encryption [117821].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in the article is malicious in nature. The incident involved security vulnerabilities in the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation that could be exploited by a determined hacker to administer a double dose of medication to victims. Researchers from McAfee Enterprise found ways to manipulate the devices, allowing an attacker to compromise the security of the devices, escalate privileges, view sensitive information, upload arbitrary files, and perform remote code execution. The vulnerabilities could be exploited by an attacker with access to a healthcare facility's network, and the attack scenario was deemed realistic and feasible for an attacker to carry out [117821]. (b) The software failure incident is non-malicious in the sense that the vulnerabilities were not intentionally introduced by the manufacturer. The vulnerabilities were discovered by security researchers from McAfee Enterprise and German government researchers, indicating that they were not deliberately planted in the software. The company, B. Braun, responded by issuing a security alert to customers, recommending software updates and network security mitigations to keep the devices secure. The vulnerabilities were present in older versions of the software, and the company took steps to remove the vulnerable networking feature in newer versions of its SpaceStations [117821].
Intent (Poor/Accidental Decisions) unknown (a) The intent of the software failure incident was not due to poor decisions but rather due to a series of vulnerabilities and flaws in the software and network connectivity of the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation. The failure was a result of security vulnerabilities that allowed a determined hacker to manipulate the infusion pump to administer a double dose of medication to victims. Researchers from McAfee Enterprise found ways to exploit these vulnerabilities, demonstrating that an attacker could compromise the security of the devices, escalate privileges, view sensitive information, upload arbitrary files, and perform remote code execution [117821]. The vulnerabilities were not a result of poor decisions but rather a lack of robust security measures and proper access controls in the software and network connectivity of the medical devices.
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the case of the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation. Despite being designed to be extremely locked down at the software level to prevent direct commands, researchers from McAfee Enterprise found ways to bypass these security measures and exploit vulnerabilities in the system. The vulnerabilities allowed attackers to manipulate the infusion pump to administer a double dose of medication, potentially putting patients at risk [117821]. (b) The software failure incident can also be attributed to accidental factors, as the vulnerabilities in the B. Braun infusion pump system were not intentionally designed but rather discovered by researchers. The lack of proper access controls, data integrity verification, authentication of commands, and encryption led to accidental loopholes that could be exploited by attackers. Additionally, the unrestricted upload bug was uncovered by German government researchers, indicating accidental oversights in the system's design and implementation [117821].
Duration permanent, temporary (a) The software failure incident in the article is more likely to be considered permanent. The vulnerabilities found in the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation were significant and allowed for manipulation of medication administration, privilege escalation, viewing sensitive information, uploading arbitrary files, performing remote code execution, changing infusion rates, and compromising the security of the devices [117821]. These vulnerabilities were not easily patched in existing products, and the company had to remove the vulnerable networking feature in the new version of its SpaceStations to address the issues. The attack scenario created by combining multiple vulnerabilities was deemed realistic and feasible for an attacker to carry out, highlighting the seriousness and long-term impact of the software failure incident. (b) The software failure incident can also be seen as temporary to some extent. While the vulnerabilities were identified and exploited by researchers, the company had not seen evidence that the vulnerabilities had been exploited maliciously in the real world [117821]. The company recommended using the latest versions of its software released in October and implementing network security mitigations to enhance device security. Additionally, the McAfee researchers withheld some details of their findings as a precaution, indicating a temporary measure to prevent potential exploitation of the vulnerabilities until more comprehensive security measures could be implemented.
Behaviour other (a) crash: The software failure incident in the article is not related to a crash where the system loses state and does not perform any of its intended functions. The incident involves security vulnerabilities in medical devices that could be exploited by hackers to manipulate the administration of medication [Article 117821]. (b) omission: The software failure incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s). Instead, the incident revolves around security vulnerabilities that could allow attackers to manipulate the dosage of medication administered by the medical devices [Article 117821]. (c) timing: The software failure incident is not characterized by a failure due to the system performing its intended functions correctly but too late or too early. The focus of the incident is on security vulnerabilities that could be exploited to manipulate the administration of medication by the medical devices [Article 117821]. (d) value: The software failure incident does not involve a failure due to the system performing its intended functions incorrectly. Instead, the incident is related to security vulnerabilities in medical devices that could be exploited by hackers to manipulate the dosage of medication administered to patients [Article 117821]. (e) byzantine: The software failure incident does not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. The incident primarily concerns security vulnerabilities in medical devices that could be exploited by attackers to compromise the security of the devices and manipulate medication administration [Article 117821]. (f) other: The software failure incident involves security vulnerabilities in medical devices, particularly infusion pumps, that could be exploited by hackers to administer a double dose of medication to patients. The vulnerabilities allow attackers to escalate privileges, view sensitive information, upload arbitrary files, perform remote code execution, change infusion pump configurations, and compromise the security of the devices. The incident highlights the importance of addressing cybersecurity risks in medical devices to ensure patient safety [Article 117821].

IoT System Layer

Layer Option Rationale
Perception network_communication, embedded_software (a) sensor: The software failure incident related to the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation was primarily due to vulnerabilities in the network communication and embedded software layers rather than sensor errors. The vulnerabilities allowed a determined hacker to manipulate the infusion pump to administer a double dose of medication by exploiting network connectivity vulnerabilities and flaws in the software system [117821]. (b) actuator: The software failure incident did not involve any specific mention of failures related to the actuator layer of the cyber-physical system. The focus was on vulnerabilities in the network communication and embedded software layers that allowed attackers to take control of the infusion pump and change the rate of infusions [117821]. (c) processing_unit: The failure was not directly attributed to issues with the processing unit or processing errors. Instead, the vulnerabilities exploited by hackers were related to network communication and flaws in the embedded software of the infusion pump system [117821]. (d) network_communication: The software failure incident was primarily caused by vulnerabilities in network communication. Hackers could exploit common connectivity vulnerabilities to take control of the SpaceStation and then manipulate the infusion pump to administer a double dose of medication. The attack scenario involved exploiting flaws in network communication to send commands that altered the rate of infusions [117821]. (e) embedded_software: The failure incident was significantly linked to vulnerabilities in the embedded software of the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation. Researchers found ways to bypass security measures and manipulate the devices by exploiting flaws in the embedded software, allowing them to escalate privileges, view sensitive information, upload arbitrary files, and perform remote code execution. The vulnerabilities in the embedded software were critical in enabling the attack scenario [117821].
Communication link_level, connectivity_level The software failure incident related to the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation was primarily related to the connectivity level of the cyber-physical system that failed. Researchers from McAfee Enterprise found ways to exploit common connectivity vulnerabilities in the devices to manipulate the infusion pump's operation, such as doubling the rate of flow of medication. They were able to exploit network vulnerabilities to gain control of the SpaceStation and then exploit four other flaws in sequence to send commands to the infusion pump, ultimately compromising the security of the devices [117821].
Application TRUE The software failure incident described in the article [117821] was related to the application layer of the cyber physical system. The failure was due to security vulnerabilities in the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation that allowed a determined hacker to manipulate the devices to administer a double dose of medication to victims. The vulnerabilities were exploited by the researchers from McAfee Enterprise by finding ways to get around the security barriers at the software level, allowing them to take control of the SpaceStation and manipulate the connected infusion pump's configuration, including the rate of infusions. The vulnerabilities included lack of access controls between the SpaceStation and the pump, lack of data integrity verification, lack of command authentication, lack of upload restrictions, and plaintext data transmission without encryption. These issues at the application layer of the system contributed to the security failure incident.

Other Details

Category Option Rationale
Consequence death, harm, non-human (a) death: The software failure incident involving the B. Braun Infusomat Space Large Volume Pump and B. Braun SpaceStation had the potential to lead to adverse events, injuries, and even deaths. The FDA received roughly 56,000 reports of adverse events related to infusion pumps between 2005 and 2009, including numerous injuries and deaths [117821]. (b) harm: The software failure incident could have resulted in physical harm to patients as attackers could manipulate the infusion pump to administer a double dose of medication, leading to potential harm to the patients [117821]. (f) non-human: Non-human entities, specifically medical devices like infusion pumps and SpaceStations, were impacted by the software failure incident. The vulnerabilities in the B. Braun devices allowed for potential manipulation by hackers, compromising the security and functionality of the devices [117821].
Domain health (a) The failed system in this incident was related to the health industry, specifically affecting medical devices like infusion pumps used in healthcare facilities [117821].

Sources

Back to List