Federal agencies are warning hospitals of a backdoor discovered in a
popular line of patient monitors sold by Chinese company Contec.
The Cybersecurity and Infrastructure Security Agency (CISA) and Food
and Drug Administration (FDA) released warnings on Thursday about an
embedded function they found in the firmware of the Contec CMS8000 —
hardware used to display information like vital signs, temperature,
heartbeat and blood pressure.
Contec Medical is a medical device company based in Hebei, China. The
affected patient monitors are “used in medical settings in the U.S. and
European Union,” CISA [1]said.
The backdoor “may allow remote code execution and device modification
with the ability to alter its configuration, introducing risk to
patient safety as a malfunctioning patient monitor could lead to an
improper response to patient vital signs.”
CISA noted that the Contec CMS8000 may be re-labeled and sold by
resellers, with the FDA explaining that Epsimed MN-120 patient monitors
are also Contec CMS8000 devices inside.
The FDA [2]said in a statement that the monitors “may be remotely
controlled by an unauthorized user or not work as intended.” CISA
[3]tagged the vulnerabilities as CVE-2024-12248, CVE-2025-0626 and
CVE-2025-0683.
The FDA said it has not seen any cybersecurity incidents, injuries or
deaths that related to the vulnerabilities but warned that the bugs
would allow hackers to bypass security controls and manipulate devices.
Contec did not respond to requests for comment. There is no software
patch to address the issues discovered by the two agencies.
“The FDA and CISA continue to work with Contec to correct these
vulnerabilities as soon as possible.”
Internet activity
The software on the monitors “includes a backdoor, which may mean that
the device or the network to which the device has been connected may
have been or could be compromised,” the FDA said.
“Once the patient monitor is connected to the internet, it begins
gathering patient data, including personally identifiable information
(PII) and protected health information (PHI), and exfiltrating
(withdrawing) the data outside of the health care delivery
environment.”
CISA said the IP address connected to the backdoor is “not associated
with a medical device manufacturer or medical facility but a
third-party university.”
The agency did not name the university or its location. CISA and the
FDA did not respond to requests for comment about the university.
Patients and healthcare providers should ask healthcare facilities if
their devices have remote monitoring features, which allow hospital
officials to look at patient vital signals from another location, the
agencies said.
If it is confirmed that a device allows remote monitoring, “unplug the
device and stop using it,” the FDA warned. Patients should ask for an
alternative patient monitor.
The agency urged hospital staff to use only local monitoring features,
which would allow them to unplug the device’s ethernet cable and
disable wireless capabilities.
“The FDA has authorized these patient monitors only for wired
functionality (that is, ethernet connectivity). However, the FDA is
aware that some patient monitors may be available with wireless (that
is, WiFi or cellular) capabilities without FDA authorization,” the
agency noted.
Disclosed by a researcher
In a longer [4]technical report about the issues, CISA said an external
researcher notified the agency of the issues through its Coordinated
Vulnerability Disclosure Process. CISA then tested the findings and
“discovered what resembles a reverse backdoor within all three of the
firmware packages.”
While some companies enable this kind of functionality for updates,
CISA said it is unlikely this is the case for the backdoors discovered.
They found that the functionality exhibited “highly unusual
characteristics that do not support the implementation of a traditional
update feature.”
“When the function is executed, files on the device are forcibly
overwritten, preventing the end customer — such as a hospital — from
maintaining awareness of what software is running on the device,” CISA
said.
“These types of actions and the lack of critical log/auditing data go
against generally accepted practices and ignore essential components
for properly managed system updates, especially for medical devices.”
Get more insights with the
Recorded Future
Intelligence Cloud.
[5]Learn more.
No previous article
No new articles
[6]Jonathan Greig
[7]
Jonathan Greig
is a Breaking News Reporter at Recorded Future News. Jonathan has
worked across the globe as a journalist since 2014. Before moving back
to New York City, he worked for news outlets in South Africa, Jordan
and Cambodia. He previously covered cybersecurity at ZDNet and
TechRepublic.
References
1.
https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor
2.
https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication
3.
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01
4.
https://www.cisa.gov/sites/default/files/2025-01/fact-sheet-contec-cms8000-contains-a-backdoor-508c.pdf
5.
https://www.recordedfuture.com/platform?mtm_campaign=ad-unit-record
6.
https://therecord.media/author/jonathan-greig
7.
https://therecord.media/author/jonathan-greig