Bluetooth Standards Are Reshaping Medical Devices

The Internet of Things (IoT) has brought about new applications for connected devices. Manufacturers are moving beyond headsets and keyboards. One of these new use cases stands out in particular: applications that rely less on continuous streaming and periodically relay small amounts of data instead.

This is especially true in sensor applications where a remote peripheral is relaying information about its surroundings - such as a thermostat, security sensor, or a medical monitoring device.

At the same time, an advance in the Bluetooth standard is making these new applications possible.  

A Brief History of Bluetooth Classic and Bluetooth Low Energy    

Bluetooth feels like it has been around forever. In fact, the original specification has been around since 1998 and the first hands-free headsets appeared on the market in 1999. Since then, it’s been used to connect everything from computer mice and keyboards to portable speakers and headphones. Bluetooth Classic, as it’s now called, covers a range of 79 channels and can transmit up to 3Mb/s up to 50 meters - making it useful for data transmission, streaming audio, and sharing pictures with other smartphones, among other things.  

While many devices using Bluetooth Classic are battery operated (at least the peripherals), power was never an issue - since the components were designed for easy recharging and battery replacement. It didn’t matter if your computer mouse’s battery only lasted a few days. You could just plug in a charging cable or swap out the batteries.

A new standard, Bluetooth Low Energy (BLE), has emerged to support lower bandwidth rates, ranging from 125 Kb/s up to 2 Mb/s, including a new connectionless mode in addition to the connection-oriented mode of Classic. The biggest advancement in BLE is its power-saving capability to power devices for much longer.

By default, BLE peripherals sleep until they’re ready to transmit data. Combined with lower power utilisation during transmission at the lower data rates, power consumption of BLE devices is typically only 1-5% of devices using Bluetooth Classic. Their power drain is in the range of 15-20 microamps, meaning a standard button cell can power most BLE devices for years.  

Reshaping the Internet of Medical Things 

Reasonable data transfer rates coupled with low power consumption make BLE devices attractive for consumer applications, such as headphones and thermostats, but that’s only part of the story. Those same attributes also make BLE ideal for connected medical devices - otherwise known as the Internet of Medical Things (IoMT).

A glucose monitor, for example, can use BLE to relay glucose levels to a smartphone for convenient monitoring. In a hospital setting, inexpensive BLE tags attached to devices can make inventory tracking and location much easier. Moreover, BLE’s support for large numbers of connected peripherals makes it even more valuable in a clinical or hospital setting, which may involve hundreds (or thousands) of connected medical devices. Think about a nurse’s monitoring station, for example. With BLE, you can have all the floor’s ECGs and other patient monitoring devices relaying telemetry information to a central place. It's the same idea behind health-related wearables such as heart monitors and fitness watches - all of which relay pulse information over BLE. 

Dispensing with cables, bulky batteries, and enabling smartphone communication is a giant step forward. But as with any innovation, there are inevitable risks. And in the case of medical devices, these risks don’t simply cause inconveniences like diminishing audio quality or battery life. When it comes to the IoMT, device risks can directly jeopardise patient safety.  

Cyber Security in the Internet of Medical Things  

For connected medical devices, cyber attacks are a massive threat to patient safety. For example, an attack against a BLE radio interface can interfere with the essential performance of a IoMT device - which could harm or potentially kill a patient. Multiple vulnerabilities like these have already been discovered in Bluetooth-enabled medical devices, leading to widely publicised disclosures, mandatory mitigations, and device recalls.

One of the most impactful examples is the SweynTooth vulnerabilities which impacted a number of BLE IoMT devices. The impact was so severe that the FDA published a safety communication to medical device manufacturers, warning of the dangers imposed if one of the vulnerabilities were triggered - which could crash, deadlock, and freeze devices, or even enable an attacker to bypass its security safeguards.  

The biggest lesson from SweynTooth (and other vulnerabilities like it) was that it made manufacturers aware of upstream vulnerabilities in the supply chain.

As concerning as the vulnerabilities were, medical device manufacturers didn’t write the flawed code. In fact, they were unaware they existed. They simply sourced a Bluetooth System on Chip (SoC) from a trusted, well-known electronic component manufacturer and included it in their device. The SoCs delivered the vulnerabilities. There simply wasn’t enough security testing performed prior to product shipment, which puts every system they’re included on at risk. 

Uncovering Hidden Vulnerabilities With Protocol Fuzzing  

The SweynTooth vulnerabilities affected several experienced manufacturers, including Texas Instruments, NXP, Cypress, Dialog Semiconductors, Microchip, STMicroelectronics, and Telink Semiconductor. How were so many different manufacturers impacted? The problem is that the vulnerabilities were hidden in the protocol stacks, making it incredibly difficult to detect and diagnose.

While the security community has developed a series of best practices for discovering application-level vulnerabilities - including common tactics and databases of threat libraries which can be crossed-checked with application software and libraries - protocol-level vulnerabilities are much harder to pinpoint.

In fact, there’s only one way to adequately test for these kind of vulnerabilities: an exhaustive testing mechanism known as protocol fuzzing.  

In layman’s terms, protocol fuzzing involves systematically injecting various errors into a communication exchange to confuse the entity at the other end of a connection and put it into an incorrect state. This can involve fairly simple errors, such as sending multiple copies of a packet, or can entail more sophisticated corruptions of a protocol. Here are a few examples: 

  • The flags indicating the beginning and end of a connection can be set in a single packet. 
  • Fields within a packet can be too large or too small. 
  • Fields within a packet can be set to invalid values. 
  • Packets can be delivered out of order.  

In many cases, the “handshake”, which occurs at the beginning of a connection to establish security, encryption, and other communication parameters, is an easy target for exploitation. Since the remote device is configuring itself based on settings established during the handshake, specially corrupted packets (or packet sequences) can cause shutdowns or communication errors, which need to be manually reset.  

In a worst-case scenario, an attacker could target the handshake itself, as documented in CVE-2019-19194. Since the handshake establishes security and encryption parameters, an attacker can bypass the controls which would normally restrict certain actions and enable arbitrary control of the system. For IoMT devices in particular, this could have obvious and disastrous impacts. An attacker could instruct the device to report incorrect telemetry data, ignore other commands, violate patient privacy rules by reporting data to an unauthorised system, or even administer a potentially lethal medication dose.  

Securing Protocol-level Vulnerabilities In BLE-enabled IoMT Devices   

Clearly, this type of vulnerability is a serious concern for medical device manufacturers - as reflected by the FDA’s focus in the USA and similar regulatory scrutiny worldwide. But what’s the best way to protect connected devices? For starters, that means implementing validation and verification strategies to identify vulnerabilities in SoC protocol stacks. Manufacturers need to serve as the last line of defence. After all, they’re the ones on the hook to rapidly distribute warning communications, mitigation strategies, and remediation firmware updates for impacted devices to patients and care providers. And, as noted in the above example, even the most well-resourced suppliers aren’t immune from delivering vulnerable chipsets.  

However, security is a journey, not a destination. That’s why, at minimum, device manufacturers must insist on remedial updates from chipset vendors prior to product release. And, at the same time, they must also take it upon themselves to conduct extensive protocol fuzzing assessments of their devices - while including their validation and verification strategies in FDA pre-market clearance submissions.  

As BLE connectivity for IoMT devices becomes more prevalent, protocol fuzzing validation will become even more critical in maintaining patient safety and trust in advancing technologies.

Fortunately, protocol fuzzing toolkits are becoming more widely available and easier to use - even for quality control teams who have little to no experience in cyber security. And given the time it may take for a chipset vendor to thoroughly reproduce, diagnose, remedy, and validate vulnerabilities, the time to start the process of testing products in the development pipeline is now.

One need only look to SweynTooth to see that the later a vulnerability is found, the more costly the impact of remediation.   

Scott Register is Vice President of Security Solutions at Keysight Technologies

You Might Also Read: 

Protecting Medical Devices From Cyber Attacks:

 

« EU Still Blocking Social Media Users' Data Transfer
Insurers Will Exclude Some Nation-State Cyber Attacks From Cover »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.