Analysis finds vulnerable PACS servers in Europe

2019 10 10 00 18 2356 Computer Lock Security 400

A German security firm has identified hundreds of unprotected PACS servers around the world that store millions of medical images and related patient information. Although more than half of those exposed data records were on servers in the U.S., a substantial number were also found among European countries.

The analysis, which was performed by Greenbone Networks between mid-July 2019 and early September 2019, showed that 590 of the 2,300 archive systems worldwide were accessible on the internet via web browser or free software programs. These contained 24 million data records from patients around the world -- including 19 European countries -- and more than 737 million images linked to the data records. Of these 737 million images, 400 million could easily be downloaded.

Furthermore, 39 systems -- including one in Switzerland -- were completely unprotected, enabling access to patient data via an unencrypted hypertext transfer protocol (HTTP) web viewer.

"The sum of these data leaks of unprotected patient data available on the internet is one of the largest data glitches worldwide to date," researchers from Greenbone wrote in their report. "52 countries around the world are affected, including all leading economic nations and the most populous countries in the world."

The vast majority of the accessible data records included information protected by the European Union's General Data Protection Regulation: patient name, birth date, examination date, scope of the investigation, type of imaging procedure, attending physician, institute/clinic, and the number of generated images, according to Greenbone.

Open image servers by European country, ranked by No. of accessible data records for imaging studies
European country Systems allowing unprotected access via DICOM No. of accessible imaging study data records No. of images linked to imaging study data records No. of accessible images
Turkey 36 4,924,141 179,533,940 178,283,858
Slovakia 1 127,636 382,908 0
Italy 10 102,893 5,843,319 1,174,600
Czech Republic 2 97,997 674,686 0
France 7 47,662 5,275,222 2,668,170
Serbia 1 30,484 15,242,000 15,242,000
Bulgaria 2 27,058 40,977 40,977
Spain 1 17,662 52,986 0
Germany 6 15,310 2,859,595 1,394.845
Netherlands 3 11,270 113,408 113,408
Greece 2 10,211 2,557,600 2,557,600
Russian Federation 5 9,858 887,042 25,000
Portugal 3 5,766 1,581,101 1,581,100
Cyprus 1 3,459 1,124,175 1,124,175
U.K. 6 1,571 13,335 5,070
Switzerland 2 1,541 231,840 231,840
Ukraine 1 1,139 199,325 199,325
Albania 1 200 1,000 0
Romania 1 67 737 0

On the bright side, only one country -- Switzerland -- had a system that allowed unprotected access to patient data via either a DICOM web viewer, unencrypted file transfer protocol (FTP) service, downloading of complete DICOM archives via HTTP, or a directory listing in the web browser for the DICOM archive files.

Public attention

After performing its initial analysis, Greenbone shared its findings with German public broadcaster Bayerischer Rundfunk, which then teamed up with nonprofit journalism organization ProPublica on a collaborative investigation and report. They scanned the IP addresses of the unprotected servers and attempted to identify which medical provider they belonged to and determined how many patients could be affected.

They also found that some servers were running outdated operating systems with known security vulnerabilities. The organizations reported that most cases of unprotected data involved independent radiologists, medical imaging centers, or archiving services; large hospital chains and academic medical centers had security protections in place. In good news, no evidence was found that patient data had been copied from the open systems and published elsewhere.

The Greenbone report and subsequent investigation by Bayerischer Rundfunk and ProPublica has also triggered investigations by the U.K. National Health Service (NHS) and the Information Commissioner's Office, according to a report published 29 September in the Times.

Recommendations

These vulnerabilities are caused by a faulty configuration of the infrastructure and the server, rather than a PACS software issue. As a result, the Greenbone researchers suggested several possibilities for remedying the problem:

  • Access control lists for all Internet Protocol (IP) addresses and/or port filters
  • Access control through the implementation of authentication, authorization, and accounting (AAA) systems
  • Virtual private network (VPN) access for selected persons/institutions
  • Detailed configuration of application entity (AE) titles

"These measures could make accessing the systems more difficult, or prevent access altogether," the authors wrote. "In doing so, however, it is important to consider which authorized authorities require access to the data, such as hospital associations or general practitioners."

The Greenbone team also acknowledged that each individual site may not be able to implement all of the available solutions.

"However, according to our observations, there is no case in which a higher degree of security would not be worthwhile," the authors wrote. "A comprehensive and repeated inventory of IT systems and their vulnerabilities within an organization is the best way to uncover such flawed configurations."

Page 1 of 1244
Next Page