The Cybersecurity and Infrastructure Agency (CISA) and Food and Drug Administration (FDA) have issued advisories to healthcare providers regarding a cybersecurity vulnerability affecting Illumina medical devices.
The FDA website released a statement on June 2nd warning laboratory personnel and healthcare providers of the the cybersecurity vulnerability associated with the Illumina software, which includes the Illumina NextSeq 550Dx, the MiSeqDx, the NextSeq 500, NextSeq 550, MiSeq, iSeq and MiniSeq, next generation sequencing instruments.
According to the statement, the cybersecurity vulnerability impacts the Local Run Manager (LRM) software and could allow unauthorized users to exploit the vulnerability by taking over instrument controls remotely and accessing the system to alter settings, configurations, software or data on the instrument or customer’s network.
The vulnerability may also allow unauthorized users to alter the instruments intended for clinical diagnosis, including causing the instruments to produce incorrect or no results, altered results, or even a potential data breach.
The CISA ICS Advisory (ICSA-22-153-02) provides a more technical overview of the vulnerability, including a detailed list of the affected products outlined below.
The following devices and instruments using LRM software are affected:
Review the Urgent Safety Notification or Product Quality Notification (for RUO Customers) sent by Illumina on May 3, 2022, to affected customers. If you did not receive a notification from Illumina, but believe you should have, please contact [email protected].
Immediately download and install the software patch (Dx mode and RUO mode) on every affected instrument, including each stand-alone instance of the off-instrument LRM for RUO mode on the Dx instruments, while connected to the internet.
Contact [email protected]a.com for instructions on other ways to install the software patch if you are not connected to the internet.
Immediately contact [email protected] if you suspect your instrument may have been compromised by an unauthorized user.
Minimizing network exposure for all control system devices and/or systems, and ensuring they are not accessible from the Internet.
Locating control system networks and remote devices behind firewalls and isolating them from the business network.
Using secure methods, such as Virtual Private Networks (VPNs) when remote access is required, recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognizing VPN is only as secure as its connected devices.
The Schneider Downs cybersecurity practice consists of experts offering a comprehensive set of information technology security services, including penetration testing, intrusion prevention/detection review, ransomware security, vulnerability assessments and a robust digital forensics and incident response team. In addition, our Digital Forensics and Incident Response teams are available 24x7x365 at 1-800-993-8937 if you suspect or are experiencing a network incident of any kind.
You’ve heard our thoughts… We’d like to hear yours
The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].
Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.