• Home
  • News
  • Business
  • Gear
  • Reviews
  • Games
  • Science
  • Security
Reading: A Flaw in the VA’s Medical Records Platform May Put Patients at Risk
Share
Ad image
Technology MagazineTechnology Magazine
Aa
  • News
  • Business
  • Gear
  • Reviews
  • Games
  • Science
  • Security
Search
  • Home
  • News
  • Business
  • Gear
  • Reviews
  • Games
  • Science
  • Security
Have an existing account? Sign In
Follow US
Technology Magazine > Security > A Flaw in the VA’s Medical Records Platform May Put Patients at Risk
Security

A Flaw in the VA’s Medical Records Platform May Put Patients at Risk

Press room
Press room Published August 13, 2022
Last updated: 2022/08/13 at 9:18 PM
Share
SHARE

Though the United States Department of Veterans Affairs runs some interesting technology programs, it’s not known for being a flexible and nimble organization. And when it comes to electronic medical records management, the VA has had a slow but high-stakes drama playing out for years. 

The department’s records platform, VistA, first instituted in the late 1970s, is lauded as effective, reliable, and even innovative, but decades of under-investment have eroded the platform. Multiple times throughout the 2010s, the VA has said it will replace VistA (short for Veterans Information Systems and Technology Architecture) with a commercial product, and the latest iteration of this effort is currently ongoing. In the meantime, though, security researchers are finding real security issues in VistA that could affect patient care. They want to disclose them to the VA and get the issues fixed, but they haven’t found a way to do it because VistA is on death row.

At the DefCon security conference in Las Vegas on Saturday, Zachary Minneker, a security researcher with a background in healthcare IT, is presenting findings about a worrying weakness in how VistA encrypts internal credentials. Without an additional layer of network encryption (like TLS, which is now ubiquitous across the web), Minneker found that the home-brewed encryption developed for VistA in the 1990s to protect the connection between the network server and individual computers can be easily defeated. In practice, this could allow an attacker on a hospital’s network to impersonate a healthcare provider within VistA, and possibly modify patient records, submit diagnoses, or even theoretically prescribe medications.

“If you were adjacent on the network without TLS, you could crack passwords, replace packets, make modifications to the database. In the worst-case scenario, you’d essentially be able to masquerade as a doctor,” Minneker tells WIRED. “This is just not a good access control mechanism for an electronic medical record system in the modern era.”

Minneker, who is a security engineer at the software-focused firm Security Innovation, only briefly discussed the findings during his DefCon talk, which was mostly focused on a broader security assessment of VistA and the database programming language MUMPS that underlies it. He has been attempting to share the finding with the VA since January through the department’s vulnerability disclosure program and Bugcrowd third-party disclosure option. But VistA is out of scope for both programs. 

This may be because the VA is currently attempting to phase our VistA using a new medical records system designed by Cerner Corporation. In June, the VA announced that it would delay a general rollout of the $10 billion Cerner system until 2023 because pilot deployments have been plagued by outages and have potentially led to almost 150 cases of patient harm. 

The VA did not return WIRED’s multiple requests for comment about Minneker’s findings or the broader situation with disclosing vulnerabilities in VistA. In the meantime, though, VistA is not only deployed across the VA healthcare system, it is also used elsewhere.

Press room August 13, 2022
Share this Article
Facebook TwitterEmail Print
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You Might Also Like

Security

The TikTok CEO’s Face-Off With Congress Is Doomed

5 Min Read
Security

How You Can Tell the AI Images of Trump’s Arrest Are Deepfakes

5 Min Read
Security

The Scorched-Earth Tactics of Iran’s Cyber Army

5 Min Read
Security

Online Sleuths Untangle the Mystery of the Nord Stream Sabotage

4 Min Read
  • Review
  • Top Lists
  • Contact
  • Privacy Policy
  • Terms of use

We influence 20 million users and is the number one business and technology news network on the planet.

I have read and agree to the terms & conditions

Contact US

  • Contact Us
  • DMCA
  • Editorial Policy
  • Advertise

Quick Link

  • Gear
  • Games
  • Security
  • Reviews

© 2022 Technology Magazine. All Rights Reserved.

Follow US on Socials

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?