Tankies of Lemmy how do you explain a Heart Monitor having a reverse backdoor with the IP of a university in China? (www.cisa.gov)
from TheEighthDoctor@lemmy.zip to cybersecurity@sh.itjust.works on 10 Feb 16:05
https://lemmy.zip/post/31779707

#cybersecurity

threaded - newest

deranger@sh.itjust.works on 10 Feb 16:19 next collapse

Through Team82’s analysis, we have come to the conclusion that this alert is not a hidden backdoor as suggested by CISA and the FDA, but instead an insecure design issue, creating potential security risks to patient data. The CONTEC Operator Manual specifically mentions this “hard-coded” IP address as the Central Management System (CMS) IP address that organizations should use, so it is not hidden functionally as stated by CISA.

Absent additional threat intelligence, this nuance is important because it demonstrates a lack of malicious intent, and therefore changes the prioritization of remediation activities. Said differently, this is not likely to be a campaign to harvest patient data and more likely to be an inadvertent exposure that could be leveraged to collect information or perform insecure firmware updates. Regardless, because an exposure exists that is likely leaking PHI randomly or could be used in some scenarios for malicious updates, the exposure should be remediated as a priority (see recommendations below).

claroty.com/…/are-contec-cms8000-patient-monitors…

Shiggles@sh.itjust.works on 10 Feb 16:36 collapse

That’s an awful lot of words to say it’s a backdoor that could, plausibly, have been installed unintentionally, but is still very much a backdoor.

Telorand@reddthat.com on 10 Feb 16:43 next collapse

The point is that the intent is not clearly malicious. It could be, if we get further evidence that points in that direction, but you can’t say the evidence we have means it was a malicious act.

People should always be skeptical, but that doesn’t mean we get to deny the facts just because we don’t like them.

Reality_Suit@lemmy.world on 10 Feb 16:59 collapse

Everything made and done by China is for the CCP. That’s how we know it’s malicious. Xi has clearly stated that.

Telorand@reddthat.com on 10 Feb 17:25 next collapse

And did Xi use these backdoors? Were they exploited in the wild?

That anything can be used for the CCP doesn’t mean everything is. That’s an appeal to probability fallacy. Just because the Chinese government has a vested interest in seeing the US fall doesn’t mean every flawed piece of software or hardware was put there at Xi’s behest or that he even knows about them.

Again, just because we would rather see a malicious actor doesn’t mean one is there. Sometimes, life is just a bunch of mundane mistakes.

liyunxiao@sh.itjust.works on 10 Feb 18:04 collapse

Source?

0x0@programming.dev on 10 Feb 18:59 collapse

A backdoor plainly and openly described in the manual is an oxymoron.

kbal@fedia.io on 10 Feb 17:04 next collapse

Tankies of lemmy are not the first people I'd go to with topical cybersecurity questions.

technocrit@lemmy.dbzer0.com on 11 Feb 17:33 collapse

It’s not a cybersecurity question as much as an inconsequential and misleading conspiracy theory.

random@lemmy.blahaj.zone on 11 Feb 17:54 collapse

tankies actually don’t like cybersecurity for the people, they belive that the vanguard party should controll all data and technology