{"id":90812,"date":"2018-08-11T17:00:03","date_gmt":"2018-08-12T00:00:03","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=90812"},"modified":"2025-05-27T19:58:45","modified_gmt":"2025-05-28T02:58:45","slug":"80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/","title":{"rendered":"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals"},"content":{"rendered":"<p><em>The author thanks Shaun Nordeck, MD, for his assistance with this report. <\/em><\/p>\n<p>With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it.\u00a0The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data. McAfee\u2019s Advanced Threat Research team is exploring these devices to increase awareness about their security.<\/p>\n<p>Some medical devices, such as pacemakers and insulin pumps, have already been examined for security concerns. To help select an appropriate target for our research, we spoke with a doctor. In our conversations we learned just how important the accuracy of a patient\u2019s vital signs is to medical professionals. \u201cVital signs are integral to clinical decision making\u201d explained Dr. Shaun Nordeck. Bedside patient monitors and related systems are key components that provide medical professionals with the vital signs they need to make decisions; these systems are now the focal point of this research.<\/p>\n<h2><strong>Exploring the attack surface<\/strong><\/h2>\n<p>Most patient monitoring systems comprise at minimum of two basic components: a bedside monitor and a central monitoring station. These devices are wired or wirelessly networked over TCP\/IP. The central monitoring station collects vitals from multiple bedside monitors so that a single medical professional can observe multiple patients.<\/p>\n<p>With the help of eBay, we purchased both a patient monitor and a compatible central monitoring station at a reasonable cost. The patient monitor monitored heartbeat, oxygen level, and blood pressure. It has both wired and wireless networking and appeared to store patient information. The central monitoring station ran Windows XP Embedded, with two Ethernet ports, and ran in a limited kiosk mode at start-up. Both units were produced around 2004; several local hospitals confirmed that these models are still in use.<\/p>\n<p>The two devices offer a range of potential attack surfaces. The central monitoring station operates fundamentally like a desktop computer running Windows XP, which has been extensively researched by the security community. The application running on the central monitoring station is old; if we found a vulnerability, it would likely be tied to the legacy operating system. The patient monitor\u2019s firmware could be evaluated for vulnerabilities; however, this would affect only one of the two devices in the system and is the hardest vector to exploit. This leaves the communication between the two devices as the most interesting attack vector since if the communication could be compromised, an attack could possibly be device independent, affecting both devices by a remote attack. Given this possibility, we chose networking as the first target for this research. Dr. Nordeck confirmed that if the information passing to the central monitoring system could be modified in real time, this would be a meaningful and valid concern to medical professionals. Thus the primary question of our research became \u201cIs it possible in real time to modify a patient\u2019s vitals being transmitted over the network?\u201d<\/p>\n<h2><strong>Setup<\/strong><\/h2>\n<p>When performing a vulnerability assessment of any device, it is best to first operate the device as originally designed. Tracking vital signs is the essence of the patient monitor, so we looked for a way to accurately simulate those signs for testing. Many hardware simulators are on the market and vary drastically in cost. The cheapest and easiest vital sign to simulate turned out to be a heartbeat. For less than $100 we purchased an electrocardiogram (ECG) simulator on eBay. The following image illustrates our test network:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90814\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-1.jpg\" alt=\"\" width=\"651\" height=\"607\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-1.jpg 651w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-1-300x280.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-1-536x500.jpg 536w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/a><\/p>\n<p><em>In our test bed, the patient monitor (left), central monitoring station (right), and a research computer (top) were attached to a standard switch. The research computer was configured on a monitor port of the switch to sniff the traffic between the central monitoring device and the patient monitor. The ECG simulator was attached to the patient monitor.<\/em><\/p>\n<h2><strong>Reconnaissance<\/strong><\/h2>\n<p>With the network configured, we turned to Wireshark to watch the devices in action. The first test was to boot only the central monitor station and observe any network traffic.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90815\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-2.jpg\" alt=\"\" width=\"1250\" height=\"610\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-2.jpg 1250w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-2-300x146.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-2-768x375.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-2-1024x500.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-2-1025x500.jpg 1025w\" sizes=\"auto, (max-width: 1250px) 100vw, 1250px\" \/><\/a><\/p>\n<p>In the preceding screenshot a few basic observations stand out. First, we can see that the central station is sending User Datagram Protocol (UDP) broadcast packets every 10 seconds with a source and destination port of 7000. We can also see clear-text ASCII in the payload, which provides the device name. After collecting and observing these packets for several minutes, we can assume this is standard behavior. Because the central station is running on a Window XP embedded machine, we can attempt to verify this information by doing some quick reverse engineering of the binaries used by the application. After putting several libraries into Interactive Disassembler Pro, it is apparent that the symbols and debugging information has been left behind. With a little cleanup and work from the decompilers, we see the following code:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90816\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-3.jpg\" alt=\"\" width=\"1344\" height=\"610\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-3.jpg 1344w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-3-300x136.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-3-768x349.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-3-1024x465.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-3-1102x500.jpg 1102w\" sizes=\"auto, (max-width: 1344px) 100vw, 1344px\" \/><\/a><\/p>\n<p>This loop calls a function that broadcasts Rwhat, a protocol used by some medical devices. We also can see a function called to get the amount of time to wait between packets, with the result plugged into the Windows sleep function. This code block confirms what we saw with Wireshark and gives us confidence the communication is consistent.<\/p>\n<p>Having gained basic knowledge of the central monitoring station, the next step was to perform the same test on the patient monitor. With the central station powered down, we booted the patient monitor and watched the network traffic using Wireshark.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90818\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-4.jpg\" alt=\"\" width=\"896\" height=\"378\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-4.jpg 896w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-4-300x127.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-4-768x324.jpg 768w\" sizes=\"auto, (max-width: 896px) 100vw, 896px\" \/><\/a><\/p>\n<p>We can make similar observations about the patient monitor\u2019s broadcast packets, including the 10-second time delay and patient data in plaintext. In these packets we see that the source port is incrementing but the destination port, 7000, is the same as the central monitoring station\u2019s.\u00a0 After reviewing many of these packets, we find that offset 0x34 of the payload has a counter that increments by 0xA, or 10, with each packet. Without potentially damaging the patient monitor, there is no good way to extract the firmware to review its code. However, the central monitoring station must have code to receive these packets. With a bit of digging through the central station\u2019s binaries, we found the section parsing the broadcast packets from the patient monitor.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90819\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-5.jpg\" alt=\"\" width=\"1620\" height=\"660\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-5.jpg 1620w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-5-300x122.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-5-768x313.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-5-1024x417.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-5-1227x500.jpg 1227w\" sizes=\"auto, (max-width: 1620px) 100vw, 1620px\" \/><\/a><\/p>\n<p>The first line of code parses the payload of the packet plus 12 bytes. If we count in 12 bytes from the payload on the Wireshark capture, we can see the start of the patient data in clear text. The next function called is parse_logical_name, whose second parameter is an upper limit for the string being passed. This field has a maximum length of 0x20, or 32, bytes. The subsequent code handles whether this information is empty and stores the data in the format logical_name. This review again helps confirm what we see in real time with Wireshark.<\/p>\n<p>Now that we understand the devices\u2019 separate network traffic, we can look at how they interact. Using our network setup and starting the ECG simulator we can see the central monitor station and the patient monitor come to life.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90820\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-6.jpg\" alt=\"\" width=\"1920\" height=\"1080\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-6.jpg 1920w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-6-300x169.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-6-768x432.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-6-1024x576.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-6-889x500.jpg 889w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90821\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-7.jpg\" alt=\"\" width=\"1259\" height=\"649\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-7.jpg 1259w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-7-300x155.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-7-768x396.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-7-1024x528.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-7-970x500.jpg 970w\" sizes=\"auto, (max-width: 1259px) 100vw, 1259px\" \/><\/a><\/p>\n<p>With everything working, we again use Wireshark to examine the traffic. We find a new set of packets.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90822\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-8.jpg\" alt=\"\" width=\"1274\" height=\"812\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-8.jpg 1274w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-8-300x191.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-8-768x489.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-8-1024x653.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-8-784x500.jpg 784w\" sizes=\"auto, (max-width: 1274px) 100vw, 1274px\" \/><\/a><\/p>\n<p>In the preceding screen capture we see the patient monitor at IP address 126.4.153.150 is sending the same-size data packets to the central monitoring station at address 126.1.1.1. The source port does not change.<\/p>\n<p>Through these basic tests we learn a great deal:<\/p>\n<ul>\n<li>The two devices are speaking over unencrypted UDP<\/li>\n<li>The payload contains counters and patient information<\/li>\n<li>The broadcast address does not require the devices to know each other\u2019s address beforehand<\/li>\n<li>When the data is sent distinct packets contain the waveform<\/li>\n<\/ul>\n<h2><strong>Attacking the protocol<\/strong><\/h2>\n<p>Our reconnaissance tells us we may have the right conditions for a replay attack. Such an attack would not satisfy our goal of modifying data in real time across the network; however, it would provide more insight about the requirements and may prove useful in reaching our goal.<\/p>\n<p>After capturing the packets from the simulated heartbeat, we attempted to replay the captures using Python\u2019s Scapy library. We did this with the patient monitor turned off and the central monitoring station listening for information. After several attempts, this test was unsuccessful. This failure shows the system expects more than just a device sending data packets to a specific IP address.<\/p>\n<p>We examined more closely the packets that are sent before the data packets. We learned that even though the packets are sent with UDP, some sort of handshake is performed between the two devices. The next diagram describes this handshake.<em>\u00a0<\/em><\/p>\n<p><em>\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90823\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-9.jpg\" alt=\"\" width=\"1184\" height=\"525\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-9.jpg 1184w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-9-300x133.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-9-768x341.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-9-1024x454.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-9-1128x500.jpg 1128w\" sizes=\"auto, (max-width: 1184px) 100vw, 1184px\" \/><\/a><\/em><\/p>\n<p><em>In this fanciful dialog, CMS is the central monitoring system; PM is the patient monitor.<\/em><\/p>\n<p>To understand what is happening during the handshake, we can relate each phase of this handshake to that of a TCP three-way handshake. (This is only an analogy; the device is not actually performing a TCP three-way handshake.)<\/p>\n<p>The central monitoring station first sends a packet to port 2000 to the patient monitor. This can be considered the \u201cSYN\u201d packet. The patient monitor responds to the central station; notice it responds to the source port of the initial request. This can be considered the \u201cSYN,ACK.\u201d The central station sends the final \u201cACK,\u201d essentially completing a three-way (or three-step) handshake. Directly following this step, the patient monitor sends another packet to the initial port of the \u201cSYN\u201d packet. The central monitor responds to the patient monitor on port 2000 with a new source port. Immediately following, we see the data packets being sent to the new source port, 3627, named in the previous exchange.<\/p>\n<p>This exam provides insight into why the replay attack did not work. The central station defines for each connection which ports will be open for the incoming data; we need to consider this when attempting a replay attack. Modifying our previous Scapy scripts to account for the handshake, we retested the replay attack. With the new handshake code in place, the test still failed. Taking another look at the \u201cSYN,ACK\u201d packets provides a potential reason for the failure.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90824\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-10.jpg\" alt=\"\" width=\"1168\" height=\"338\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-10.jpg 1168w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-10-300x87.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-10-768x222.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-10-1024x296.jpg 1024w\" sizes=\"auto, (max-width: 1168px) 100vw, 1168px\" \/><\/a><\/p>\n<p>At offset 0x3D is a counter that needs to be incremented each time one of these packets is sent. In this case the patient monitor\u2019s source IP address is embedded in the payload at offsets 0x2A and 0x30. This embedded IP address is not as important for this attack because during the replay our scripts can become the patient monitor\u2019s IP; however, this will become more important later. The newly discovered counter needs to be accounted for and incremented.<\/p>\n<h2><strong>Emulating a patient monitor<\/strong><\/h2>\n<p>By taking these new findings into account our replay attack becomes successful. If we can observe a certain ECG pattern, we can play it back to the central monitoring station without the patient monitor on the network. Thus we can emulate the function of the patient monitor with any device. The following video demonstrates this emulation using a Raspberry Pi. We set our Scapy scripts to load after booting the Pi, which mimics the idle function of the patient monitor. When the central monitor requests information about the patient\u2019s vitals, the Pi provides the station with an 80-beats-per-minute wave form. This also works with the other vital signs.<\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"\/\/players.brightcove.net\/21712694001\/Sypf9RNV_default\/index.html?videoId=5820595267001\" allowfullscreen=\"allowfullscreen\"><br \/>\n<\/iframe><\/div>\n<\/div>\n<h3><\/h3>\n<h2><strong>Impact of emulation<\/strong><\/h2>\n<p>Although we have not yet reached our goal of real-time modification, we must consider the implications of this type of attack. If someone were to unplug the monitor of a stable patient and replace it with a device that continued to report the same stable vitals, would that cause any harm? Probably not immediately. But what if the stable patient suddenly became unstable? The central station would normally sound an alarm to alert medical personal, who could take appropriate action. However, if the monitor had been replaced, would anyone know help was needed? The patient monitor also normally sounds alarms that might be heard in and outside of the patient\u2019s room, yet if the monitor was replaced, those alarms would be absent.<\/p>\n<p>In hospitals, nurses and other personal generally make periodic checks even of stable patients. So any deception might not last long, but it might not need to. What if someone were trying to kidnap a patient? A kidnapper would alert fewer people than would be expected.<\/p>\n<p>Switching from a real patient monitor to an emulator would cause a short loss in communication from the patient\u2019s room to the central monitoring station. Is this enough to make the scenario unrealistic or not a threat? We asked Dr. Nordeck if a short loss in connection could be part of a reasonable scenario. \u201cA momentary disconnection of the ECG would likely go unnoticed as this happens often due to patient movement or changing clothes and, as long as it is reconnected, will be unlikely to cause an alert,\u201d he said.<\/p>\n<h2><strong>Modifying vitals in real time<\/strong><\/h2>\n<p>Although emulating the patient monitor is interesting, it did not accomplish our goal of making real-time modifications. Using what we learned while testing emulation, could we perform real-time injection? To answer this question, we must first understand the difference between emulation and real-time injection.<\/p>\n<p>Emulation requires a deeper understanding of how the initial connection, the handshake, between the two devices occurred. When considering real-time modification, this handshake has already taken place. But an attacker would not know which port the data packets are being sent too, nor any of the other ports used in the data stream. Plus, because the real patient monitor is still online, it will constantly send data to the central monitoring station.<\/p>\n<p>One way to account for these factors is to use Address Resolution Protocol (ARP) spoofing. If the patient monitor is ARP spoofed, then the attacker, instead of the central monitoring station, would receive the data packets. This step would allow the attacker to determine which ports are in use and stop the patient monitor\u2019s data from getting to the central monitoring station. Because we have already shown that emulation works, the attacker simply has to send replacement data to the central station while appearing as the patient monitor.<\/p>\n<p>For example, consider the following original packet coming from the patient monitor:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90825\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-11.jpg\" alt=\"\" width=\"1549\" height=\"481\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-11.jpg 1549w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-11-300x93.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-11-768x238.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-11-1024x318.jpg 1024w\" sizes=\"auto, (max-width: 1549px) 100vw, 1549px\" \/><\/a><\/p>\n<p>The patient monitor sends a packet with the patient\u2019s heartbeat stored at offset 0x71 in the payload. The patient monitor in this screen capture is at IP address 126.4.153.150. An attacker can ARP spoof the patient monitor with a Kali virtual machine.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90826\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-12.jpg\" alt=\"\" width=\"1038\" height=\"240\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-12.jpg 1038w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-12-300x69.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-12-768x178.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-12-1024x237.jpg 1024w\" sizes=\"auto, (max-width: 1038px) 100vw, 1038px\" \/><\/a><\/p>\n<p>The ARP packets indicate that the central station, IP address 126.1.1.1, is at MAC address 00:0c:29:a1:6e:bf, which is actually the Kali virtual machine. Wireshark recognizes two MACs with the same IP address assigned and highlights them, showing the ARP spoof.<\/p>\n<p>Next the attacker from the virtual machine at address 126.4.153.153 sends false information to the central monitoring station, still at address 126.1.1.1. In this example, offset 0x71 has been changed to 0x78, or 120. (The attacker could choose any value; the following demo videos use the heartbeat value 180 because it is more alarming.) Also notice the IP address stored in the payload, which we discovered during the reconnaissance phase. It still indicates this data is coming from the original patient monitor address, which is different from the IP address on the packet\u2019s IP header. Due to this implementation, there is no need for the attacker to spoof their IP address for the attack to be successful.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-13.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90827\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-13.jpg\" alt=\"\" width=\"1718\" height=\"501\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-13.jpg 1718w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-13-300x87.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-13-768x224.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-13-1024x299.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-13-1715x500.jpg 1715w\" sizes=\"auto, (max-width: 1718px) 100vw, 1718px\" \/><\/a><\/p>\n<p>Two videos show this modification happening in real time:<\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"\/\/players.brightcove.net\/21712694001\/Sypf9RNV_default\/index.html?videoId=5820596183001\" allowfullscreen=\"allowfullscreen\"><br \/>\n<\/iframe><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"\/\/players.brightcove.net\/21712694001\/Sypf9RNV_default\/index.html?videoId=5820596182001\" allowfullscreen=\"allowfullscreen\"><br \/>\n<\/iframe><\/div>\n<\/div>\n<h3><\/h3>\n<h2><strong>Impact of real-time modification<\/strong><\/h2>\n<p>Although the monitor in the patient\u2019s room is not directly affected, real-time modification is impactful because medical professionals use these central stations to make critical decisions on a large number of patients\u2014instead of visiting each room individually. As long as the changes are believable, they will not always be verified.<\/p>\n<p>Dr. Nordeck explains the impact of this attack: \u201cFictitious cardiac rhythms, even intermittent, could lead to extended hospitalization, additional testing, and side effects from medications prescribed to control heart rhythm and\/or prevent clots. The hospital could also suffer resource consumption.\u201d\u00a0Dr. Nordeck explained that short changes to a heartbeat would generally trigger the nurse or technician monitoring the central station to page a doctor. The doctor would typically ask for a printout from the central station to review the rhythm. The doctor might also order an additional test, such as an EKG, to verify the rhythm. An EKG, however, would not likely capture an abnormal rhythm if it is intermittent, but the test might reveal an underlying cause for intermittent arrythmia. Should the rhythm recur intermittently throughout the day, the doctor might make treatment decisions based on this erroneous printout.<\/p>\n<p>The American Heart Association and American College of Cardiology publish guidelines that hospitals are to follow, including for \u201cintermittent cardiac rhythms,\u201d seen in this chart:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90828\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/08\/20180809-Vitals-14.png\" alt=\"\" width=\"766\" height=\"995\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-14.png 766w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-14-231x300.png 231w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/08\/20180809-Vitals-14-385x500.png 385w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\" \/><\/a><\/p>\n<p><em>A decision tree for treating an intermittent heart rate. Source: American Heart Association.<\/em><\/p>\n<p>The first decision point in this tree asks if the patient is hemodynamically stable (whether the blood pressure is normal). This attack does not affect the bedside monitor. A nurse might retake the patient\u2019s blood pressure, which would be normal. The next decision point following the \u201cYes\u201d path is a diagnosis of focal atrial tachycardia. Regardless of the medical terms and answers, the patient is issued medication. In the case of a network attack, this is medication the patient does not need and could cause harm.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>This research from McAfee\u2019s Advanced Threat Research team shows it is possible to emulate and modify a patient\u2019s vital signs in real time on a medical network using a patient monitor and central monitoring station. For this attack to be viable, an attacker would need to be on the same network as the devices and have knowledge of the networking protocol. Any modifications made to patient data would need to be believable to medical professionals for there to be any impact.<\/p>\n<p>During our research we did not modify the patient monitor, which always showed the true data; but we have proven the impact of an attack can be meaningful. Such an attack could result in patients receiving the wrong medications, additional testing, and extended hospital stays\u2014any of which could incur unnecessary expenses.<\/p>\n<p>Both product vendors and medical facilities can take measures to drastically reduce the threat of this type of attack. Vendors can encrypt network traffic between the devices and add authentication. These two steps would drastically increase the difficulty of this type of attack. Vendors also typically recommend that medical equipment is run on a completely isolated network with very strict network-access controls. If medical facilities follow these recommendations, attackers would require physical access to the network, greatly helping to reduce the attack surface.<\/p>\n<p>One goal of the McAfee Advanced Threat Research team is to identify and illuminate a broad spectrum of threats in today&#8217;s complex and constantly evolving landscape. Through responsible disclosure we aim to assist and encourage the industry toward a more comprehensive security posture. As part of our policy, we reported this research to the vendor whose products we tested and will continue to work with other vendors to help secure their products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it.\u00a0The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.<\/p>\n","protected":false},"author":892,"featured_media":93001,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526,3949,4452,3969,4131,4827],"coauthors":[4927],"class_list":["post-90812","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-advanced-threat-research","tag-cybersafety","tag-cybersecurity","tag-healthcare","tag-internet-of-things","tag-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals | McAfee Blog<\/title>\n<meta name=\"description\" content=\"With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it.\u00a0The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it.\u00a0The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-12T00:00:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T02:58:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Douglas McKee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fulmetalpackets\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Douglas McKee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/\"},\"author\":{\"name\":\"Douglas McKee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7258a70ccfed80c87deb0ff79eee1ffb\"},\"headline\":\"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals\",\"datePublished\":\"2018-08-12T00:00:03+00:00\",\"dateModified\":\"2025-05-28T02:58:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/\"},\"wordCount\":3167,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg\",\"keywords\":[\"Advanced Threat Research\",\"cybersafety\",\"cybersecurity\",\"healthcare\",\"Internet of Things\",\"vulnerability\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/\",\"name\":\"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg\",\"datePublished\":\"2018-08-12T00:00:03+00:00\",\"dateModified\":\"2025-05-28T02:58:45+00:00\",\"description\":\"With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it.\u00a0The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg\",\"width\":2048,\"height\":1365,\"caption\":\"Telemedicine visit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7258a70ccfed80c87deb0ff79eee1ffb\",\"name\":\"Douglas McKee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/e54e5d329578bf9389cb75beac2b6471\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Douglas-01-5x5-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Douglas-01-5x5-96x96.jpg\",\"caption\":\"Douglas McKee\"},\"description\":\"Douglas McKee is a Principal Engineer and Senior Security Researcher for the Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. Douglas has an extensive background in vulnerability research, penetration testing, reverse engineering, malware analysis, and forensics and throughout his career has provided software exploitation training to many audiences, including law enforcement. Doug is a regular speaker at industry conferences such as DEF CON and his research is regularly featured in publications with broad readership including Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/douglas-mckee-77460677\/\",\"https:\/\/x.com\/fulmetalpackets\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/douglas-mckee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals | McAfee Blog","description":"With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it.\u00a0The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals | McAfee Blog","og_description":"With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it.\u00a0The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-08-12T00:00:03+00:00","article_modified_time":"2025-05-28T02:58:45+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg","type":"image\/jpeg"}],"author":"Douglas McKee","twitter_card":"summary_large_image","twitter_creator":"@fulmetalpackets","twitter_site":"@McAfee","twitter_misc":{"Written by":"Douglas McKee","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/"},"author":{"name":"Douglas McKee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7258a70ccfed80c87deb0ff79eee1ffb"},"headline":"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals","datePublished":"2018-08-12T00:00:03+00:00","dateModified":"2025-05-28T02:58:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/"},"wordCount":3167,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg","keywords":["Advanced Threat Research","cybersafety","cybersecurity","healthcare","Internet of Things","vulnerability"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/","name":"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg","datePublished":"2018-08-12T00:00:03+00:00","dateModified":"2025-05-28T02:58:45+00:00","description":"With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it.\u00a0The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/McAfee_business_medical_1female_nurse_tablet_hospital_room.jpg","width":2048,"height":1365,"caption":"Telemedicine visit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"80 to 0 in Under 5 Seconds: Falsifying a Medical Patient\u2019s Vitals"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7258a70ccfed80c87deb0ff79eee1ffb","name":"Douglas McKee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/e54e5d329578bf9389cb75beac2b6471","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Douglas-01-5x5-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Douglas-01-5x5-96x96.jpg","caption":"Douglas McKee"},"description":"Douglas McKee is a Principal Engineer and Senior Security Researcher for the Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. Douglas has an extensive background in vulnerability research, penetration testing, reverse engineering, malware analysis, and forensics and throughout his career has provided software exploitation training to many audiences, including law enforcement. Doug is a regular speaker at industry conferences such as DEF CON and his research is regularly featured in publications with broad readership including Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.","sameAs":["https:\/\/www.linkedin.com\/in\/douglas-mckee-77460677\/","https:\/\/x.com\/fulmetalpackets"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/douglas-mckee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/892"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=90812"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90812\/revisions"}],"predecessor-version":[{"id":214481,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90812\/revisions\/214481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93001"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=90812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=90812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=90812"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=90812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}