• Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Special Offers
Business Intelligence Info
  • Business Intelligence
    • BI News and Info
    • Big Data
    • Mobile and Cloud
    • Self-Service BI
  • CRM
    • CRM News and Info
    • InfusionSoft
    • Microsoft Dynamics CRM
    • NetSuite
    • OnContact
    • Salesforce
    • Workbooks
  • Data Mining
    • Pentaho
    • Sisense
    • Tableau
    • TIBCO Spotfire
  • Data Warehousing
    • DWH News and Info
    • IBM DB2
    • Microsoft SQL Server
    • Oracle
    • Teradata
  • Predictive Analytics
    • FICO
    • KNIME
    • Mathematica
    • Matlab
    • Minitab
    • RapidMiner
    • Revolution
    • SAP
    • SAS/SPSS
  • Humor

Widely-used patient care app found to include hidden ‘backdoor’ access

May 27, 2016   DWH News and Info

surgery Widely used patient care app found to include hidden ‘backdoor’ access

(Image: stock photo)

An clinical application suite designed to help clinical teams manage patients ahead of surgical operations includes a hidden username and password, which could be used to access and modify patient records.

The hard-coded credentials in Medhost’s Perioperative Information Management System (PIMS) have not been publicly disclosed, but if known could allow an attacker to “backdoor” the app to read or change sensitive information on patients, who are about to or have just recently been in surgery.

The bug prompted the CERT security advisory team at Carnegie Mellon University, which tracks bugs and security issues, to issue an advisory, warning administrators to upgrade to a newer version of the software that removes the credentials.

Users of the app — typically clinical staff and physicians — are able to get wide-ranging data on patients. On its website, the company touts how the app enables anesthesiologists to “access to critical patient information in real-time and allows them to ensure patient condition and status are good,” as well as “detailed information on patient health medical history, physical exam, etc. and is readily available to all clinicians throughout the department.”

The advisory said that the attacker must have the ability to “communicate directly with the server.” However, PIMS can be remotely hosted and managed, the application’s documentation states.

According to Medhost’s website, its PIMS application delivers “real-time access to patient data and clinical systems,” from “initial consult, complete anesthesia and nurse charting through decision support and post-surgery discharge.”

It’s not known how many installations or how many users and patients are affected. The company is said to serve around 1,000 healthcare facilities.

A Medhost spokesperson declined to comment further when contacted late-Thursday.

Daniel Dunstedter, who was credited with finding and privately disclosing the flaw, could not be reached for comment.

More security news

Let’s block ads! (Why?)

Colbran South Africa

Access, care, Found, Hidden, include, patient, Widelyused, ‘backdoor’
  • Recent Posts

    • Ba’al comes to CPAC, Ted Cruz jokes about his Cancun trip
    • Optimizing data migration/integration with Power Platform
    • AI Weekly: Biden calls for $37 billion to address chip shortage
    • NOT WHAT THEY MEANT BY “BUILDING ON THE BACKS OF….”
    • Why Healthcare Needs New Data and Analytics Solutions Before the Next Pandemic
  • Categories

  • Archives

    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
© 2021 Business Intelligence Info
Power BI Training | G Com Solutions Limited