Security bulletins
N’vision 8840 physician programmer
Security vulnerabilities were identified related to the N'Vision 8840 physician programmer and its removable compact flash application card.
May 17, 2018
Updated: July 12, 2018
An external security researcher has identified potential vulnerabilities related to the Medtronic N’Vision 8840 physician programmer and removable compact flash application card. The security researcher acquired one of Medtronic’s N’Vision 8840 physician programmers — a small, handheld device used solely by healthcare professionals to program certain Medtronic neuromodulation devices. The researcher’s report details that the compact flash application card used in the physician programmer may contain unencrypted patient personal health information if that information is not deleted following individual patient device programming. Additionally, it is possible that someone with physical access to the 8870 compact flash card and sufficient technical capability may be able to modify it to execute arbitrary code on the clinician programmer.
Medtronic has assessed this vulnerability per our internal process and found:
Medtronic recommends that hospital and clinician users minimize risk by:
Medtronic’s broader security structure is designed to limit a potential attacker’s ability to exploit system vulnerabilities. Some of these limitations include:
Any exploit that leverages this vulnerability requires physical access to the physician programmer and modification and/or replacement of the programming card without the physician being aware.
Additionally, these devices are not sold. They are loaned to physicians for use in programming Medtronic neuromodulation devices and subject to specific terms of service and use. While in a hospital’s possession, they remain the property of Medtronic and should be returned directly to Medtronic when they are no longer in use. Any sale or transfer of the 8840 and 8870 to any other party is strictly prohibited.
The application card stores PHI and PII as part of its normal operating procedure and should be handled, managed and secured in a manner consistent with the applicable laws for patient data privacy. Medtronic has not developed a product update to address the vulnerability but is reinforcing security practices within this bulletin to help reduce the risk associated with the vulnerability.
Medtronic actively reviews its security practices to mitigate risks during premarket development and postmarket use.
The full ICS-CERT security advisory can be found here.