CISA ICS Medical Advisories CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.1 |
Compatible with ThreatQ Versions | >= 4.52.0 |
Support Tier | ThreatQ Supported |
Introduction
The CISA ICS Medical Advisories CDF consumes data provided by the CISA about current security issues, vulnerabilities, and exploits surrounding ICS (Industrial Control Systems).
The integration provides the following feed:
- CISA ICS Medical Advisories - creates a ThreatQ Report for each CISA advisory.
The integration ingests the following system objects:
- Indicators
- Indicator Attributes
- Reports
- Report Attributes
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the OSINT option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Verify Host SSL When enabled, the integration will validate the host-provided SSL certificate. This parameter is enabled by default. Parse CVEs When enabled, all the CVEs found in the description will be ingested. This parameter is enabled by default.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
CISA ICS Medical Advisories
The CISA ICS Medical Advisories feed ingests threat intelligence data in the form of ThreatQ Reports.
GET https://www.cisa.gov/cybersecurity-advisories/ics-medical-advisories.xml
Sample Response (truncated XML):
<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.cisa.gov/">
<channel>
<title>ICS Medical Advisories</title>
<link>https://www.cisa.gov/</link>
<description/>
<language>en</language>
<item>
<title>Medtronic Micro Clinician and InterStim Apps</title>
<link>https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-061-01</link>
<description><h2>1. EXECUTIVE SUMMARY</h2>
<ul><li><strong>CVSS v3 6.4</strong></li>
<li><strong>ATTENTION:</strong> Low attack complexity </li>
<li><strong>Vendor:</strong> Medtronic </li>
<li><strong>Equipment:</strong> Micros Clinician (A51200) app and InterStim X Clinician (A51300) app </li>
<li><strong>Vulnerabilities:</strong> Unverified Password Change </li>
</ul><h2>2. RISK EVALUATION</h2>
<p>Successful exploitation of this vulnerability could cause the clinician application’s custom
password to be reset to default, resulting in unauthorized control of the clinician therapy application.
</p>
<h2>3. TECHNICAL DETAILS</h2>
<h3>3.1 AFFECTED PRODUCTS</h3>
<p>The following versions of Medtronic Clinician App are affected: </p>
<ul><li>Micro Clinician (A51200) </li>
<li>InterStim X Clinician (A51300) </li>
</ul><h3>3.2 VULNERABILITY OVERVIEW</h3>
<p><strong>3.2.1 <a href="https://cwe.mitre.org/data/definitions/620.html">UNVERIFIED
PASSWORD CHANGE CWE-620</a> </strong></p>
<p>Medtronic Clinician (A51200) and InterStim X Clinicain App (A51300) contain a vulnerability
that exists under certain reset conditions, which could cause the clinician application’s custom
password to be reset to a default password. This could result in unauthorized control of the clinician
therapy application, which has greater control over therapy parameters than the patient app. Changes
still cannot be made outside of the established therapy parameters of the programmer. To gain
unauthorized access, an individual would need physical access to the Smart Programmer. </p>
<p><a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25931">CVE-2023-25931</a>
has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS
vector string is (<a
href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H">AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H</a>).
</p>
<h3>3.3 BACKGROUND</h3>
<ul><li><strong>CRITICAL INFRASTRUCTURE SECTORS:</strong> Healthcare and Public
Health </li>
<li><strong>COUNTRIES/AREAS DEPLOYED:</strong> Worldwide </li>
<li><strong>COMPANY HEADQUARTERS LOCATION:</strong> Ireland </li>
</ul><h3>3.4 RESEARCHER</h3>
<p>Medtronic reported this vulnerability to CISA. </p>
<h2>4. MITIGATIONS</h2>
<p>The following mitigations have been provided by Medtronic: </p>
<ul><li>An app update is available as of February 23, 2023 that will fix the vulnerability.
</li>
<li>Users should refer to the Medtronic <a
href="https://global.medtronic.com/xg-en/product-security/security-bulletins/pelvic-health-interstim-micro.html">Security
Bulletin</a> for the correct Medtronic Support contact for help updating the app. </li>
</ul><p>CISA reminds organizations to perform proper impact analysis and risk assessment
prior to deploying defensive measures.</p>
<p>CISA also provides a section for <a
href="https://us-cert.cisa.gov/ics/Recommended-Practices">control systems security recommended
practices</a> on the ICS webpage at <a href="https://cisa.gov/ics">cisa.gov/ics</a>.
Several CISA products detailing cyber defense best practices are available for reading and download,
including <a
href="https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf">Improving
Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies</a>.</p>
<p>Additional mitigation guidance and recommended practices are publicly available on the ICS
webpage at <a href="https://cisa.gov/ics">cisa.gov/ics</a> in the technical information
paper, <a href="https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B">ICS-TIP-12-146-01B--Targeted
Cyber Intrusion Detection and Mitigation Strategies</a>.</p>
</description>
<pubDate>Thu, 02 Mar 2023 00:09:28 EST</pubDate>
<dc:creator>CISA</dc:creator>
<guid isPermaLink="false">/node/17499</guid>
</item>
</channel>
</rss>
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.rss.channel.item[].title | Report.Title | N/A | .rss.channel.item[].pubDate | Medtronic Micro Clinician and InterStim Apps: Thu, 02 Mar 2023 00:09:28 EST | PubDate appended to title |
.rss.channel.item[].description | Report.Description | N/A | N/A | 1. EXECUTIVE SUMMARY... | N/A |
.rss.channel.item[].description | Indicator.Value | CVE | .rss.channel.item[].pubDate | CVE-2023-25931 | CVEs are parsed out of the description and ingested based on selection |
.rss.channel.item[].description | Report.Attribute | Vendor | .rss.channel.item[].pubDate | Medtronic | Attribute parsed from the description |
.rss.channel.item[].description | Report.Attribute | Equipment | .rss.channel.item[].pubDate | Micros Clinician (A51200) app and InterStim X Clinician (A51300) app | Attribute parsed from the description |
.rss.channel.item[].description | Report.Attribute | CVSS_Score | .rss.channel.item[].pubDate | 6.4 | Attribute parsed from the description |
.rss.channel.item[].link | Report.Attribute | URL | .rss.channel.item[].pubDate | https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-061-01 | N/A |
N/A | Report.Attribute | CISA Feed Name | .rss.channel.item[].pubDate | ICS Medical Advisory | N/A |
N/A | Indicator.Attribute | CISA Activity | .rss.channel.item[].pubDate | True | N/A |
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Metric | Result |
---|---|
Run Time | <1 minute |
Reports | 10 |
Report Attributes | 50 |
Indicators | 29 |
Indicator Attributes | 29 |
Change Log
- Version 1.0.1
- Resolved a date parsing issue.
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
CISA ICS Medical Advisories CDF Guide v1.0.1 | 4.52.0 or Greater |
CISA ICS Medical Advisories CDF Guide v1.0.0 | 4.52.0 or Greater |