The backdoor on Contec CMS8000 patient-monitoring devices could allow an IP address at an unnamed university to remotely download and execute unverified files, according to CISA.

  • @[email protected]
    link
    fedilink
    English
    -41 day ago

    There are valid questions, many of which revolve around how and why it’s used.

    Some systems have brain damaged approaches to diagnostics/logging, license enforcement, or remote service/update systems that create security holes but are not intentionally malicious.

    Security is hard and we should remember Hanlon’s Razor.

    • @Benjaben
      link
      English
      61 day ago

      I get lots of mileage out of Hanlon’s Razor, and I acknowledge the rampant incompetence that suggests its applicability, but digital security seems like about the least appropriate place to apply this rule of thumb.

      • @[email protected]
        link
        fedilink
        English
        51 day ago

        As someone who has to deal with PCI compliance issues, there’s plenty of noob mistakes, out-of-date thinking and outright “let’s log this data for debugging purposes even though if any regulator found out they’d nuke us from orbit.”

        • @Benjaben
          link
          English
          31 day ago

          Fair enough, I can imagine that pretty easily.