Illumina Cybersecurity Vulnerability Advisory Issued to Healthcare Providers

The Cybersecurity and Infrastructure Agency (CISA) and Food and Drug Administration (FDA) have issued advisories to healthcare providers regarding a cybersecurity vulnerability affecting Illumina medical devices.

The FDA website released a statement on June 2nd warning laboratory personnel and healthcare providers of the the cybersecurity vulnerability associated with the Illumina software, which includes the Illumina NextSeq 550Dx, the MiSeqDx, the NextSeq 500, NextSeq 550, MiSeq, iSeq and MiniSeq, next generation sequencing instruments.

According to the statement, the cybersecurity vulnerability impacts the Local Run Manager (LRM) software and could allow unauthorized users to exploit the vulnerability by taking over instrument controls remotely and accessing the system to alter settings, configurations, software or data on the instrument or customer’s network.

The vulnerability may also allow unauthorized users to alter the instruments intended for clinical diagnosis, including causing the instruments to produce incorrect or no results, altered results, or even a potential data breach.

The CISA ICS Advisory (ICSA-22-153-02) provides a more technical overview of the vulnerability, including a detailed list of the affected products outlined below.

The following devices and instruments using LRM software are affected:

Illumina In Vitro Diagnostic (IVD) Devices

  • NextSeq 550Dx: LRM Versions 1.3 to 3.1
  • MiSeq Dx: LRM Versions 1.3 to 3.1

Researcher Use Only (ROU) Instruments

  • NextSeq 500 Instrument: LRM Versions 1.3 to 3.1
  • NextSeq 550 Instrument: LRM Versions 1.3 to 3.1
  • MiSeq Instrument: LRM Versions 1.3 to 3.1
  • iSeq 100 Instrument: LRM Versions 1.3 to 3.1
  • MiniSeq Instrument: LRM Versions 1.3 to 3.1

The good news is that Illumina has developed a software patch to remediate the vulnerability, which is available at https://support.illumina.com/downloads/illumina-local-run-manager-1.0.html. In addition to downloading the patch, the FDA recommends impacted organizations to take the following actions if applicable.

  • Review the Urgent Safety Notification or Product Quality Notification (for RUO Customers) sent by Illumina on May 3, 2022, to affected customers. If you did not receive a notification from Illumina, but believe you should have, please contact [email protected].
  • Immediately download and install the software patch (Dx mode and RUO mode) on every affected instrument, including each stand-alone instance of the off-instrument LRM for RUO mode on the Dx instruments, while connected to the internet.
  • Contact [email protected] for instructions on other ways to install the software patch if you are not connected to the internet.
  • Immediately contact [email protected] if you suspect your instrument may have been compromised by an unauthorized user.

CISA has provided additional mitigation recommendations to minimize the risk of exploitation of this vulnerability that include:

  • Minimizing network exposure for all control system devices and/or systems, and ensuring they are not accessible from the Internet.
  • Locating control system networks and remote devices behind firewalls and isolating them from the business network.
  • Using secure methods, such as Virtual Private Networks (VPNs) when remote access is required, recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognizing VPN is only as secure as its connected devices.

Related Links

About Schneider Downs Cybersecurity

The Schneider Downs cybersecurity practice consists of experts offering a comprehensive set of information technology security services, including penetration testing, intrusion prevention/detection review, ransomware security, vulnerability assessments and a robust digital forensics and incident response team. In addition, our Digital Forensics and Incident Response teams are available 24x7x365 at 1-800-993-8937 if you suspect or are experiencing a network incident of any kind.

To learn more, visit our dedicated Cybersecurity page or contact the team at [email protected]

Want to be in the know? Subscribe to our bi-weekly newsletter, Focus on Cybersecurity, at www.schneiderdowns.com/subscribe.

You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2023 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

our thoughts on
SEC Charges SolarWinds and CISO Timothy Brown For Misleading Investors
Think Before You Click: Fake Browser Updates are Back in Style
Protect Your Manufacturers: 3 Common Cyber Attack Methods to Watch Out for in 2023
Protect Your Students, Faculty and Staff: 3 Common Cyber Attack Methods to Watch Out for in 2023
Protect Your Retail Business: 3 Common Cyber Attack Methods to Watch Out for in 2023
Cybersecurity in the Construction Industry
Register to receive our weekly newsletter with our most recent columns and insights.
Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us
contact us
Pittsburgh

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×