Exposed DICOM Servers Threaten UK Healthcare Security

Exposed DICOM servers in the UK healthcare system pose a significant risk, with new vulnerabilities in the Orthanc server potentially allowing remote code execution. Immediate action is needed to protect sensitive patient data.

VulnerabilitiesHIGHUpdated: Published: ๐Ÿ“ฐ 3 sources

Original Reporting

R7Rapid7 BlogยทRapid7

AI Summary

CyberPings AIยทReviewed by Rohit Rana

๐ŸŽฏImagine if hospitals had secret doors that anyone could walk through. That's what's happening with some UK healthcare systems using DICOM for medical images. Hackers could sneak in and see or change your health information. It's super important for hospitals to lock those doors and check for any weak spots.

What Happened

Imagine walking into a hospital where the doors are locked, but the back windows are wide open. That's the current state of some UK healthcare systems, specifically those using DICOM for medical imaging. Rapid7 Labs recently discovered that over 30 healthcare systems in the UK were responding to DICOM requests over Port 104, which is the default for medical imaging traffic. Alarmingly, these systems were accessible from the public internet, raising serious security concerns.

In addition to this exposure, new vulnerabilities have been identified in the open-source DICOM server Orthanc. These vulnerabilities could allow attackers to crash servers, leak data, and execute arbitrary code remotely. The CERT Coordination Center (CERT/CC) has tracked nine security defects in Orthanc, which are rooted in insufficient validation of metadata and unsafe arithmetic operations. The most severe issues could lead to remote code execution (RCE).

Why Should You Care

You might think, "Why does this matter to me?" Well, if you or a loved one ever need medical imaging, your personal health data could be at risk. Exposed DICOM servers can leak patient identifiers and other sensitive information. This is like leaving your house key under the doormat โ€” it makes it easy for anyone to access your private space.

In a world where data breaches are rampant, the implications are serious. If these imaging systems are compromised, it could lead to unauthorized access to your medical records, identity theft, or even manipulation of medical data. Your health information is valuable, and when itโ€™s mishandled, it can have lasting consequences.

What's Being Done

Rapid7 is raising awareness about this issue, but immediate action is required from healthcare providers. Hereโ€™s what you can do if you're involved in healthcare IT:

  • Conduct a security audit of your DICOM systems to ensure they are not exposed to the internet.
  • Implement strong access controls and encryption to protect sensitive data.
  • Monitor network traffic for any unauthorized access attempts.
  • Update Orthanc to version 1.12.11 or later to mitigate the identified vulnerabilities.

Experts are closely watching how healthcare organizations respond to this alarming discovery. The hope is that this will prompt immediate action to secure vulnerable systems and protect patient data from potential breaches.

๐Ÿ”’ Pro Insight

The discovery of vulnerabilities in the Orthanc DICOM server highlights the need for robust security measures in healthcare IT. Organizations must prioritize updates and audits to safeguard patient data.

๐Ÿ“… Story Timeline

Story broke by Rapid7 Blog

Covered by CISA Advisories

Covered by SecurityWeek

Related Pings