The PwnedPiper problem poses a threat to 80% of US hospitals

PwnedPiper problem

Armis company has released details of nine vulnerabilities collectively known as the PwnedPiper problem. The problem affects medical equipment installed in about 80% of large hospitals in North America.

The vulnerabilities are related to the TransLogic Pneumatic Tube Systems (PTS), manufactured by Swisslog Healthcare. Similar to the classic pneumatic tube, the Translogic PTS is used in healthcare facilities to quickly move medical materials (laboratory samples, drugs, etc.) through special tubes that connect departments in large hospitals. Such systems are installed in more than 3000 medical institutions around the world.

Experts from IoT security firm Armis say they have found nine vulnerabilities in the Nexus Control Panel, the software used to control Translogic PTS.

The vulnerabilities allow an unauthenticated attacker to hijack Translogic PTS stations and take full control of the target hospital’s PTS network. This allows sophisticated and dangerous ransomware attacks, and hackers can steal confidential information from hospitals.the researchers said.

Although the vulnerabilities can only be exploited if an attacker is connected to the hospital’s internal network and has a foothold in it, PwndPiper’s problems were deemed extremely serious due to the prevalence of Translogic PTS systems in North America.

Since the bugs were discovered back in May, the developers of Swisslog Healthcare have already prepared patches: the company has released the Nexus Control Panel version, where all vulnerabilities are fixed except one (CVE-2021-37160), a patch for which is expected at the end of the current of the year.

In general, the following flaws were found in the Translogic PTS, which were named by PwnedPiper:

  • CVE-2021-37163: two cases of active hard-coded passwords (ures and root accounts) accessible via Telnet;
  • CVE-2021-37167: privilege escalation (using hardcoded credentials, an attacker can run a custom script with root privileges)
  • CVE-2021-37166: Denial of Service (DoS) caused by the Nexus Control Panel GUI process;
  • CVE-2021-37161: insufficient amount of resources in udpRXThread;
  • CVE-2021-37162: overflow in sccProcessMsg;
  • CVE-2021-37165: overflow in hmiProcessMsg;
  • CVE-2021-37164: three times stack overflow in tcpTxThread;
  • CVE-2021-37160: most dangerous vulnerability, firmware updates in the Nexus Control

Panel are available without authentication, encryption or signature verification.

Let me remind you that I reported that BlackMatter ransomware attacks companies with revenues above $ 100 million, including many hospitals.

By Vladimir Krasnogolovy

Vladimir is a technical specialist who loves giving qualified advices and tips on GridinSoft's products. He's available 24/7 to assist you in any question regarding internet security.

View all of Vladimir Krasnogolovy's posts.

Leave a comment

Your email address will not be published. Required fields are marked *