Medtronic disables updates for pacemaker programmers over cybersecurity concerns

Medtronic has disabled the internet update functionality of two of its CareLink devices used to program pacemaker implants amid concerns that they may be susceptible to cyberattacks, according to a letter from the medtech giant to healthcare professionals.

Vulnerabilities had been identified in the update download process that could allow an individual to update the devices with non-Medtronic software, the company said, possibly resulting in patient harm depending on the intent of the attack and the patient’s condition.

Medtronic has reviewed these vulnerabilities with the FDA and external researchers and has not observed or received reports of attacks or patient harm, the company said in a statement to FierceMedtech.

The affected programmers—the CareLink 2090 and the CareLink Encore 29901—can still receive updates through a USB port. No updates are needed for patients’ implanted devices.

Earlier this year, independent cybersecurity researchers said they found flaws in Medtronic’s pacemakers that would allow hackers to put patients at risk, according to CNBC.

In a presentation at the annual Black Hat cybersecurity conference in Las Vegas, two researchers demonstrated the security weaknesses in the pacemaker's control unit, saying the vulnerabilities allowed for “the disruption of therapy as well as the ability to execute shocks to a patient.”

RELATED: FDA planning to require cybersecurity checks in device submissions

CNBC said about 33,000 of the programming devices are currently in use. In a company statement at the time, Medtronic said that the likelihood of a breach of a patient's device is low, and that all medical devices carry some associated risk.

In September, the FDA said it would begin requiring cybersecurity documentation checks in new medical device submissions, following an HHS inspector general report that found the agency should take more steps to fully integrate cybersecurity into its premarket reviews.

The report recommended that the FDA and manufacturers use presubmission meetings to better address cybersecurity-related questions, that the agency include cybersecurity as an element in its SMART template used in 510(k) submissions, and that the FDA refuse to accept applications lacking the documentation.