Today, CISA announced on X the latest addition to their CVE Partner program, Hologic, Inc. Typically, such partners become CVE Numbering Authorities (CNA) under CISA’s root authority, and this was the case with Hologic’s breast and skeletal products. Typically, I watch these notices so that I can find the link to vendor’s cybersecurity advisories (here for Hologic) for the purpose of populating my ICS Public Disclosure posts.
I do not typically report on these announcements as they generally have little practical effect on day-to-day cybersecurity operations. For instance, in Hologic’s case, their latest cybersecurity advisory was published in 2020, as was their latest cybersecurity best practices document.
I wanted to discuss the Hologic announcement because of two other items that were listed on their cybersecurity landing page:
• Manufacturer Disclosure Statement for Medical Device Security (MDS2) forms, and
• Microsoft Patches validated for installation on Hologic Breast and Skeletal Health systems.
The first may be important to some users, but the second should be of interest to all. Hollogic has taken each of the latest Windows' updates from and applied them to computers upon which the various Hologic medical devices have also been installed. Then the systems we tested to ensure that the MS updates did not interfere with the safe operation of the medical devices.
System owners should still test updates on their own systems before using the devices with live patients, but the Hologic testing should greatly reduce the number of issues discovered.
I have only seen this testing information on a couple of other vendor web sites; BD comes to mind, and I know Siemens used to do this (they may still; it has been a while since I have taken a deep dive on the extensive Siemens web sites). So, when I see it, I try to call attention to it as an effort to encourage other vendors to do the same.