CJR-ID: CJR-EMPump-001-MFA Status: Approved Version: 1.0
| Field | Value |
|---|---|
| Device name and model | ExampleMed Volumetric Infusion Pump v3.2 |
| Manufacturer | ExampleMed Inc. |
| Device class (FDA) | Class II |
| Device archetype | Archetype 2 (embedded RTOS legacy — VxWorks 6.9) |
| MDS² reference | ExampleMed-IP3.2-MDS2-2024 |
| Asset inventory IDs | Asset register reference: pump-vlan-volumetric-ip32 |
| Deployment count | 240 units across ICU and oncology |
| Linked STRIDE-HC threat model | stride-hc-templates/examples/infusion-pump.md |
| Current MDRS score and tier | 8.175 → CRITICAL |
Multi-factor authentication for administrative access to the device management interface.
MFA not supported. The device exposes a management interface on TCP/8080 protected only by a hardcoded service-mode password documented in the vendor service manual. The device firmware does not support per-user accounts, MFA, or third-party authentication delegation.
ExampleMed Inc. has confirmed in vendor advisory ExampleMed-2024-03 that MFA support is not on the firmware roadmap for the v3.2 model due to the FDA clearance constraints associated with introducing user authentication and per-user accounting. Modifying the firmware to support MFA would require submission as a special 510(k) and is not currently planned by the vendor. The vendor recommends compensating with upstream network controls and access management.
The constraint is technical (the device cannot be modified to support MFA) and regulatory (vendor cannot ship a modified firmware without re-clearance).
Network-attacker scenarios:
Physical/insider-attacker scenarios:
| Dimension | Score | Rationale |
|---|---|---|
| Likelihood | High | Public disclosure of service credential places this in the high-likelihood band; required attacker capability is low. |
| Severity | High | Successful exploitation enables therapy parameter modification on a Class II infusion device — direct patient-safety implication. |
| Detectability | Difficult | The device generates no authentication audit log; detection depends entirely on upstream network or physical observation. |
Pattern A — Upstream PAM (privileged access management) gateway. A privileged-access-management appliance brokers all network connections to the pump management interface. Users authenticate to the PAM with individual MFA. PAM retrieves the hardcoded service credential from a vault and connects to the pump on the user’s behalf. All sessions are recorded with full keystroke and screen capture.
Paper §3.2 Table 2, “MFA not supported” constraint. Pattern A described in §3.4.
pam-gateway-ip/32 to TCP/8080 on pump VLAN; deny-all default| Dimension | Score | Rationale |
|---|---|---|
| Likelihood (residual) | Low | Credential no longer discoverable via network; physical service-port path addressed by separate CJR (CJR-EMPump-003-ServicePort). |
| Severity (residual) | High | Unchanged. The harm potential if exploitation occurs (mid-therapy parameter change) remains the same; the control reduces likelihood, not severity. |
| Detectability (residual) | Easy | PAM session logging provides full visibility into all administrative sessions, including the user identity and full session content. |
Acceptable under the organisation’s risk acceptance criteria for legacy device compensating controls (LMD-RISK-2026-001). The criteria require: residual likelihood ≤ Low, validated detection capability, and quarterly monitoring review. All criteria met.
CISO (K. Williams), with CMO concurrence under standing approval for the legacy medical device programme. Reference: LMD-RISK-2026-001, dated 2026-02-15.
High. Validated through:
test-harness/attacker/05-eop-default-credential.py confirms compensating control prevents credential discovery and exploitation on the network when the PAM control profile is enabled.| Field | Value |
|---|---|
| Author | S. Patel, Senior Clinical Engineer |
| Reviewer (Clinical Engineering) | M. Robinson, Director of Clinical Engineering |
| Reviewer (InfoSec) | J. Chen, Lead Security Architect |
| Approver (CISO) | K. Williams |
| Approver (Director of Clinical Engineering) | M. Robinson |
| Approval date | 2026-04-10 |
| Effective date | 2026-05-01 |
| Next scheduled review | 2027-04-10 |
| Trigger conditions for early review | ExampleMed Inc. security advisory; new VxWorks 6.9 CVE; PAM platform end-of-support; pump VLAN architecture change; loss of MFA service availability |
| Record type | Reference |
|---|---|
| STRIDE-HC threat model | stride-hc-templates/examples/infusion-pump.md |
| MDS² disclosure | ExampleMed-IP3.2-MDS2-2024 |
| Penetration test report | PT-2026-Q1-014 |
| Test harness output | test-harness/results/empump-v32-2026-q1.csv |
| Related CJRs | CJR-EMPump-002-Encryption, CJR-EMPump-003-ServicePort |
| Version | Date | Author | Change summary |
|---|---|---|---|
| 1.0 | 2026-04-10 | S. Patel | Initial CJR for MFA constraint on ExampleMed Volumetric Infusion Pump v3.2 |