CJR-ID: CJR-EMPump-003-ServicePort Status: Approved Version: 1.0
| Field | Value |
|---|---|
| Device name and model | ExampleMed Volumetric Infusion Pump v3.2 |
| Manufacturer | ExampleMed Inc. |
| Device class (FDA) | Class II |
| Device archetype | Archetype 2 (embedded RTOS legacy) |
| MDS² reference | ExampleMed-IP3.2-MDS2-2024 |
| Asset inventory IDs | Asset register: pump-vlan-volumetric-ip32 |
| Deployment count | 240 units |
| Linked STRIDE-HC threat model | stride-hc-templates/examples/infusion-pump.md |
| Current MDRS score and tier | 8.175 → CRITICAL |
Per-technician MFA-protected authentication for service-port (RS-232) access, with audit logging of session activity.
Service-mode password disclosed in technical manual or leaked. The service-port credential for the v3.2 pump is documented in vendor manuals that have been disclosed publicly through historical product-recall correspondence and via third-party repair documentation.
The RS-232 service-port credential (4-digit PIN) is documented in:
The vendor cannot rotate the credential in deployed firmware (rotation requires firmware update under FDA clearance). Vendor advisory ExampleMed-2024-04 acknowledges the disclosure and recommends “physical access control commensurate with the criticality of the device”.
The constraint is permanent in the deployed firmware and represents the highest-risk physical-access exposure on this pump fleet.
Physical/insider-attacker scenarios:
This is the principal residual risk scenario after CJR-EMPump-001-MFA (Pattern A upstream PAM) addresses the network-side access path. Pattern A does not protect the physical service port; this CJR documents the Pattern C compensating control that does.
| Dimension | Score | Rationale |
|---|---|---|
| Likelihood | High | Credential publicly disclosed; required attacker capability is low (physical proximity + service tool). |
| Severity | High | Service-mode access enables therapy parameter modification, configuration tampering, and reset operations. |
| Detectability | Difficult | Pump generates no service-port event log; detection depends on human observation or upstream correlation. |
Pattern C — Inline hardware MFA shim at the RS-232 service port. A small vendor-neutral hardware device sits inline between technician tooling and the pump’s RS-232 service port. The shim:
The Pattern C device is currently a research artifact with a software-first reference design published in this repository (mfa-shim/). The deployment described in this CJR is at a single ICU pilot site (12 pumps) per the FDA-aware piloting plan documented in mfa-shim/FDA-CONSIDERATIONS.md.
This is not a cleared medical device; it is a security accessory deployed under the institutional research and quality improvement programme. Production-grade hardware procurement is on the 2027 plan.
In addition to Pattern C, this CJR documents the supporting policy controls:
Paper §3.3 Table 3, “Service-mode password disclosed” constraint. Pattern C described in §3.4.
mfa-shim/prototype/| Dimension | Score | Rationale |
|---|---|---|
| Likelihood (residual) | Low | TOTP factor required in addition to disclosed PIN; population of actors with both proximity and TOTP is small and audited. |
| Severity (residual) | High | Unchanged — the harm potential if compromise occurs remains the same. |
| Detectability (residual) | Easy | Shim logs every session; video surveillance provides corroboration; audit reconciliation surfaces discrepancies. |
Acceptable for the pilot deployment under the legacy device research programme criteria (LMD-RISK-2026-001 and the research-artifact addendum LMD-RISK-2026-001A). The pilot is time-bounded (12 months) with quarterly review.
For broader deployment, the control’s status as a research artifact rather than a cleared medical device is the governing constraint. See mfa-shim/FDA-CONSIDERATIONS.md for the regulatory analysis of broader deployment paths.
CISO (K. Williams), Director of Clinical Engineering (M. Robinson), and Chief Medical Information Officer (Dr T. Aiyer) jointly, dated 2026-04-10. Pilot scope is signed off by the institutional research and quality improvement committee.
Medium for the pilot deployment. Pattern C addresses the primary disclosed-credential exposure but is itself a research-grade artifact. Validation:
test-harness/attacker/05-eop-default-credential.py confirms Pattern C prevents service-port credential abuse when the shim is operational and tamper-evident sealing is intact.A re-rating to High is contingent on (a) production hardware procurement and (b) FDA regulatory analysis confirming that inline insertion does not constitute a device modification requiring re-clearance.
| Field | Value |
|---|---|
| Author | S. Patel, Senior Clinical Engineer |
| Reviewer (Clinical Engineering) | M. Robinson |
| Reviewer (InfoSec) | J. Chen |
| Approver (CISO) | K. Williams |
| Approver (Director of Clinical Engineering) | M. Robinson |
| Approver (CMIO) | Dr T. Aiyer |
| Approval date | 2026-04-10 |
| Effective date | 2026-05-15 (after pilot site preparation) |
| Next scheduled review | 2026-08-15 (90-day pilot review), then quarterly |
| Trigger conditions for early review | Shim component failure; tamper-evident seal violation; vendor advisory; FDA clarification on inline-device classification |
| Record type | Reference |
|---|---|
| STRIDE-HC threat model | stride-hc-templates/examples/infusion-pump.md |
| MDS² disclosure | ExampleMed-IP3.2-MDS2-2024 |
| Pattern C reference design | mfa-shim/ |
| FDA regulatory analysis | mfa-shim/FDA-CONSIDERATIONS.md |
| Pilot operations review (90-day) | scheduled 2026-08-15 |
| Related CJRs | CJR-EMPump-001-MFA (Pattern A network-side), CJR-EMPump-002-Encryption |
| Test harness output | test-harness/results/empump-v32-2026-q1.csv |
| Version | Date | Author | Change summary |
|---|---|---|---|
| 1.0 | 2026-04-10 | S. Patel | Initial CJR for service-port PIN exposure on ExampleMed Volumetric Infusion Pump v3.2; introduces Pattern C compensating control under research-artifact pilot |