base-form-page
about-us

Responsible Disclosures

Product Security Policy

At Hill-Rom / Welch Allyn cybersecurity is a very serious issue and we maintain continued vigilance of cybersecurity threats and protection.  We strive to integrate cybersecurity protection as up to date as possible in our products.  Each release of a new software version includes a risk assessment review of cybersecurity and most often include updated additional security protection features within them.

In addition to incorporating cybersecurity controls into the design and development of our medical devices, Welch Allyn regularly monitors vulnerabilities and conducts risk and impact assessments accordingly. We review the list of vulnerabilities reported and make every effort to ensure that those vulnerabilities are mitigated. Our responsible disclosure policy is available below.

Any deployment of networked products leverages a customer’s existing IT infrastructure. Welch Allyn’s network best practices guide, which sets forth required and recommended network settings and configurations to enable proper connectivity, advises customers to conduct a hazards analysis pursuant to IEC 80001 (Application of Risk Management for IT-networks Incorporating Medical Devices) prior to deployment in order to identify and remedy any interoperability issues.

Responsible Disclosure

At Hill-Rom, we consider the security of our systems a top priority. 

If you discover a vulnerability, we would like to know about it so we can take steps to address it as quickly as possible. We would like to ask you to help us better protect our clients and our systems.

Please do the following:

  • E-mail your findings to [email protected]. Encrypt your findings using our GPG key to prevent this critical information from falling into the wrong hands; and
  • Provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible. Usually, the IP address or the URL of the affected system and a description of the vulnerability will be sufficient, but complex vulnerabilities may require further explanation.

Please do NOT:

  • Take advantage of the vulnerability or problem you have discovered, for example by downloading more data than necessary to demonstrate the vulnerability or deleting or modifying other people's data,
  • Reveal the potential vulnerability to others; or
  • Use attacks on physical security, social engineering, distributed denial of service, spam or applications of third parties.

What we promise:

  • We will respond promptly to your report;
  • We will handle your report with strict confidentiality, and not pass on your personal details to third parties without your permission unless we have a legal obligation to do so.

We strive to resolve all problems as quickly as possible, and we appreciate your assistance in bringing a vulnerability to our attention.

Advisory Section

ConnectWise Screen Connect 23.9.7 and Prior Vulnerabilities

Publication Date:  February 26, 2024
Last Revised Date:  February 26, 2024

BACKGROUND

We take product security seriously at Baxter in support of our mission to save and sustain lives. As part of our ongoing monitoring, Baxter is currently evaluating the recently published announcement of the vulnerabilities affecting ConnectWise ScreenConnect 23.9.7 and prior under CVE-2024-1709 and CVE-2024-1708. ConnectWise is a third-party application that can be used to provide remote service.

RESPONSE

While we continue to review our product portfolio, we have not found any indication that our products are affected by these vulnerabilities nor is there any privacy impact. If a product within the Baxter portfolio is found to use an affected version of ConnectWise, we will share this information and available mitigations on the Baxter.com Product Security and/or the Hillrom Responsible Disclosure pages as the information becomes available. Click here to get the notification.

 


 

Hillrom Product Security Bulletin

Publication Date: January 31, 2024
Last Revised Date: January 31, 2024

We take cybersecurity at Baxter seriously and are currently monitoring and evaluating the recently published announcement of the vulnerability affecting Mirth Connect under CVE-2023-43208. Mirth Connect is an open-source data integration platform from NextGen HealthCare that is used to connect data from medical systems to an electronic medical record. This vulnerability has been classified as critical.
For a more detailed description of these vulnerabilities, it is recommended customers view the information provided in the National Vulnerabilities Database.

RESPONSE

After a comprehensive review of its portfolio, Baxter is providing the information below in order to better assist our customers in identifying any Baxter products that may be vulnerable under CVE. Click here to get the notification.

RE:  Log4j

Publication Date:  December 13, 2021
Last Revised Date:  January 31 , 2022

SUMMARY

Hillrom is currently monitoring the recently published announcement of vulnerabilities affecting Log4j Java-based logging library. The Log4j library is developed by the Apache Foundation and is widely used by both enterprise apps and cloud services for logging purposes. The vulnerabilities have been classified as critical.

For a more detailed description of these vulnerability, it is recommended customers view the information provided by Apache.

RESPONSE

Please note that the Apache Log4j vulnerabilities are not Hillrom-specific vulnerabilities. As part of the company’s product security policy and protocols, Hillrom’s team continues to evaluate Hillrom’s Java based products and solutions for potential impacts from these reported vulnerabilities and evaluating further possible actions as needed.

IMPACTED PRODUCTS

Please see an update regarding Hillrom's portfolio assessment for impacts of Log4j here.


Urgent 11 Security Advisory

Publication Date:  November 15, 2019
Last Revised Date:  October 30, 2019

In accordance with FDA and US Homeland regulations, Hill-Rom has evaluated the impact of Urgent 11 vulnerabilities on its products. Click here to get the notification.

Disclosure Section

Welch Allyn Product Security Vulnerability

Publication Date:  November 22, 2022
Last Revised Date: November 22, 2022

Hillrom is providing a fix for a security vulnerability that has been found involving several products in the Welch Allyn Patient Monitoring portfolio. Click here to get the notification and information on recommendations to reduce risk.
 


Welch Allyn Product Security Vulnerability

Publication Date:  June 16, 2022
Last Revised Date:  June 16, 2022

Hillrom is providing a fix and mitigation information for a security vulnerability that has been found involving several products in the Welch Allyn Diagnostic Cardiology solutions portfolio. Click here to get the notification and the links below for information on recommendations to reduce risk.


Welch Allyn Product Security Vulnerability

Publication Date:  December 9, 2021
Last Revised Date:  December 9, 2021

Hillrom is providing a mitigation for a security vulnerability that has been found involving several products in the Welch Allyn Diagnostic Cardiology solutions portfolio. Click here to get the notification and information on recommendations to reduce risk.