We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The ventilator and the Service PC lack sufficient audit logging capabilities to allow for detection of malicious activity and subsequent forensic examination. An attacker with access to the ventilator and/or the Service PC could, without detection, make unauthorized changes to ventilator settings that result in unauthorized disclosure of information and/or have unintended impacts on device performance.
Reserved 2024-10-10 | Published 2024-11-14 | Updated 2024-11-14 | Assigner Baxterwww.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01
Support options