25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

99% Of Healthcare Orgs Managing IoMT Devices with Known Exploited Vulnerabilities

A recent analysis of connected medical devices, patient systems, and operational technology (OT) in hospitals and other healthcare delivery organizations (HDOs) has revealed an alarming number of devices and systems have vulnerabilities that could be exploited by threat actors to gain access to healthcare networks and sensitive patient data. Russian cybercrime groups and other financially motivated threat actors are targeting healthcare organizations because they are viewed as easy targets. They typically have a large attack surface, security weaknesses in their core infrastructure, and due to the need to maintain high levels of patient care and have constant access to patient data, they are viewed as the critical infrastructure most likely to pay a ransom demand.

The industrial cybersecurity platform provider Claroty analyzed more than 2.25 million Internet of Medical Things (IoMT) devices and more than 647,000 OT devices at 351 healthcare organizations, and the findings were published in its State of CPS Security: Healthcare Exposures 2025 report. Claroty found that 89% of healthcare organizations are running medical systems vulnerable to publicly available exploits, and 99% of hospitals and HDOs are managing IoMT devices with known exploited vulnerabilities (KEVs), with 96% of those organizations having KEVs linked to ransomware campaigns.

IoMT devices include imaging systems, patient devices, surgical devices, hospital information systems, and clinical IoT. Claroty determined that imaging systems such as MRI, ultrasound, CT scans, and X-ray were the most at risk. 28% of imaging systems analyzed by Claroty contained KEVs, with 11% having KEVs linked to ransomware campaigns. 8% of those imaging systems had KEVs linked to ransomware and insecure connectivity, making them an easy target for ransomware actors. 99% of organizations in the Claroty dataset were running vulnerable imaging systems.

Claroty also found that 20% of hospital information systems used to manage clinical data and administrative and financial information contained KEVs linked to ransomware groups, and these systems were also commonly insecurely connected to the Internet. OT devices can also provide an easy access point for cybercriminals, which at HDOs can include building automation devices and controllers, uninterruptible power supplies, temperature sensors, and power distribution units. If these devices and systems are compromised they can cause major disruption to hospital operations and patient care. For instance, compromised building management systems could make it impossible to store temperature-sensitive medications such as insulin, while disruption to elevators could easily result in unacceptable delays to patient care. Claority found 11,693 (2%) OT devices had confirmed KEVs, with 3,004 having KEVs linked to ransomware groups, and 4,731 devices had insecure connectivity.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

HDOs often have a large attack surface, and while efforts to reduce the attack surface through a vulnerability management program can help to reduce risk, exclusively focusing on vulnerability management means other critical exposures may be ignored, and they can be just as serious. For instance, poorly connected systems, default passwords, hardcoded credentials, and insecure protocols allowing cleartext communication between users, devices, and the cloud can all be exploited by threat actors.

Claroty recommends adopting an exposure management-driven approach, which includes compensating controls to reduce risk, in particular around vulnerable medical devices that require Food and Drug Administration (FDA) approval before software patches and firmware updates are implemented. In the report, Claroty suggests a 5-step action plan that serves as a strategic framework that goes beyond vulnerability management and gives cybersecurity teams and asset owners a true assessment of their security posture.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist