Press Releases and Statements Read our latest company news and announcements Image Press Releases Filter and Search Filter by year - Tout -20252024202320222021 Search 8 press releases Image 15 décembre 2021 Statement BIOTRONIK Statement on the Log4Shell Vulnerability The discovery of a high-severity vulnerability known as Log4Shell was disclosed publicly on December 9, 2021, while a related lower-severity vulnerability was disclosed on December 14, 2021. These vulnerabilities are present in a software library used by many servers worldwide (see Background for details). In light of this recent discovery, BIOTRONIK has carefully analyzed all of its provided services. The analysis concluded that the conditions for exploitation of the Log4Shell vulnerability and the related CVE-2021-45046 and CVE-2021-45105 vulnerabilities do not exist in any of BIOTRONIK’s Image 19 juin 2020 Statement BIOTRONIK Statement on CardioMessenger II Cybersecurity CardioMessenger devices form an essential part of BIOTRONIK’s remote monitoring system, enabling the secure transmission of critical patient and device data to the treating physician. As the company that pioneered remote monitoring, we have taken cybersecurity design seriously since 2001. It is integrated into our quality management system, all relevant business processes and prioritized at every step of the product life cycle. Our cardiac implants do not accept programming modifications or commands via any form of long-distance communication. By design, it is technically impossible to Image 4 mars 2020 Statement BIOTRONIK Statement on “SweynTooth” Cybersecurity Vulnerabilities The US Food and Drug Administration has issued a Safety Communication regarding a family of cybersecurity vulnerabilities known as SweynTooth, which may introduce risks for certain medical devices that use Bluetooth Low Energy (BLE) wireless communication technology. If exploited, these vulnerabilities can allow unauthorized users to potentially cause a device to stop working, stop it from working correctly and/or bypass security to access certain device functions. The FDA has said it is not aware of any confirmed adverse events related to these vulnerabilities although software to exploit Image 4 octobre 2019 BIOTRONIK Statement on the FDA’s Safety Communication “URGENT/11” On October 1, the US Food and Drug Administration (FDA) issued a Safety Communication regarding a set of cybersecurity vulnerabilities, referred to as “Urgent/11” that — if exploited by a remote attacker — may introduce risks for medical devices and hospital networks. According to the communication: “These vulnerabilities may allow anyone to remotely take control of the medical device and change its function, cause denial of service, or cause information leaks or logical flaws, which may prevent device function.” These vulnerabilities exist in a third-party software component known as IPnet Image 12 août 2019 Statement BIOTRONIK Statement on the Publication ‘Security Testing of the Pacemaker Ecosystem’ The work ‘Security Testing of the Pacemaker Ecosystem’ was recently published as a master’s thesis, authored by Mr. Anders Been Wilhelmsen and Mr. Eivind Skjelmo Kristiansen. This publication investigates the state of cybersecurity of BIOTRONIK’s ICS 3000 – a programmer for BIOTRONIK implantable cardiac pacemakers, defibrillators and monitors that is used by healthcare professionals during the implantation procedure and follow-ups. ICS 3000 programmers were distributed between 2001 and 2012. In the publication, the authors report about several cybersecurity weaknesses such as: The central Image 22 mars 2019 Statement BIOTRONIK Statement on the Medical Advisory and Safety Communication Regarding Medtronic’s Conexus Radio Frequency Telemetry Protocol The Department of Homeland Security and the US FDA have issued a Medical Advisory and Safety Communication respectively describing two types of cybersecurity vulnerabilities affecting multiple Medtronic devices that utilize the Conexus telemetry protocol. BIOTRONIK utilizes substantially different protocols for both the clinical and the home environment. Moreover, by design, the remote communication system via BIOTRONIK Home Monitoring® does not have the functionality to transmit or alter therapeutic commands to the implant. Image 18 octobre 2018 Statement BIOTRONIK Statement on the Cybersecurity Updates Affecting Medtronic Implantable Cardiac Device Programmers On October 11, the US Food and Drug Administration (FDA) issued a Safety Communication regarding cybersecurity updates affecting Medtronic implantable cardiac device programmers, based on an NCCIC Advisory. 1 According to the FDA’s communication, Medtronic is issuing a software update to address a safety risk caused by cybersecurity vulnerabilities associated with the internet connection in two models of programmers used to download software from the manufacturer’s software distribution network (SDN). Successful exploitation of these vulnerabilities would allow an adversary to influence this Image 17 août 2018 Statement Statement on the Cybersecurity of BIOTRONIK Solutions Following WIRED Magazine’s Article on Vulnerabilities in Pacemaker Programmer Systems On August 9, WIRED magazine reported that researchers discovered cybersecurity vulnerabilities in the way pacemaker programmers connected to the software delivery network of a specified manufacturer. The researchers claim that “digital code signing”—the cryptographic validation of the legitimacy and integrity of software—is lacking in the manufacturer’s infrastructure, allowing an attacker to potentially take control of device programmers through malicious updates that can subsequently be spread to implanted pacemakers. 1 None of BIOTRONIK’s devices, programmers or networks are affected by Subscribe to Our News You must have JavaScript enabled to use this form. Your Name Your Email Subject Message *Fields are mandatory. Latest Blog Posts Show all blog articles Image Quatre façons de réduire le risque de fibrillation auriculaire La fibrillation auriculaire est le type d’arythmie cardiaque le plus courant et touche environ 30 millions de personnes dans le monde. Image Impact de la pollution atmosphérique sur la santé cardiaque Une meilleure qualité de vie, une plus grande biodiversité et un meilleur climat : les avantages des villes vertes semblent évidents. Un mode de vie écologique, y compris le fait de respirer un air pur, joue un rôle particulièrement crucial pour la santé de notre cœur et notre bien-être général. À l’occasion de la Journée mondiale de l’environnement 4, nous avons examiné l’impact de la pollution atmosphérique sur la santé cardiaque et ce que chacun d’entre nous peut faire pour rendre nos villes plus vivables. Press Contact Corporate Public Relations & Communications press@biotronik.com +49 (0) 30 68905 1414 Get in contact
Image 15 décembre 2021 Statement BIOTRONIK Statement on the Log4Shell Vulnerability The discovery of a high-severity vulnerability known as Log4Shell was disclosed publicly on December 9, 2021, while a related lower-severity vulnerability was disclosed on December 14, 2021. These vulnerabilities are present in a software library used by many servers worldwide (see Background for details). In light of this recent discovery, BIOTRONIK has carefully analyzed all of its provided services. The analysis concluded that the conditions for exploitation of the Log4Shell vulnerability and the related CVE-2021-45046 and CVE-2021-45105 vulnerabilities do not exist in any of BIOTRONIK’s
Image 15 décembre 2021 Statement BIOTRONIK Statement on the Log4Shell Vulnerability The discovery of a high-severity vulnerability known as Log4Shell was disclosed publicly on December 9, 2021, while a related lower-severity vulnerability was disclosed on December 14, 2021. These vulnerabilities are present in a software library used by many servers worldwide (see Background for details). In light of this recent discovery, BIOTRONIK has carefully analyzed all of its provided services. The analysis concluded that the conditions for exploitation of the Log4Shell vulnerability and the related CVE-2021-45046 and CVE-2021-45105 vulnerabilities do not exist in any of BIOTRONIK’s
Image 19 juin 2020 Statement BIOTRONIK Statement on CardioMessenger II Cybersecurity CardioMessenger devices form an essential part of BIOTRONIK’s remote monitoring system, enabling the secure transmission of critical patient and device data to the treating physician. As the company that pioneered remote monitoring, we have taken cybersecurity design seriously since 2001. It is integrated into our quality management system, all relevant business processes and prioritized at every step of the product life cycle. Our cardiac implants do not accept programming modifications or commands via any form of long-distance communication. By design, it is technically impossible to
Image 19 juin 2020 Statement BIOTRONIK Statement on CardioMessenger II Cybersecurity CardioMessenger devices form an essential part of BIOTRONIK’s remote monitoring system, enabling the secure transmission of critical patient and device data to the treating physician. As the company that pioneered remote monitoring, we have taken cybersecurity design seriously since 2001. It is integrated into our quality management system, all relevant business processes and prioritized at every step of the product life cycle. Our cardiac implants do not accept programming modifications or commands via any form of long-distance communication. By design, it is technically impossible to
Image 4 mars 2020 Statement BIOTRONIK Statement on “SweynTooth” Cybersecurity Vulnerabilities The US Food and Drug Administration has issued a Safety Communication regarding a family of cybersecurity vulnerabilities known as SweynTooth, which may introduce risks for certain medical devices that use Bluetooth Low Energy (BLE) wireless communication technology. If exploited, these vulnerabilities can allow unauthorized users to potentially cause a device to stop working, stop it from working correctly and/or bypass security to access certain device functions. The FDA has said it is not aware of any confirmed adverse events related to these vulnerabilities although software to exploit
Image 4 mars 2020 Statement BIOTRONIK Statement on “SweynTooth” Cybersecurity Vulnerabilities The US Food and Drug Administration has issued a Safety Communication regarding a family of cybersecurity vulnerabilities known as SweynTooth, which may introduce risks for certain medical devices that use Bluetooth Low Energy (BLE) wireless communication technology. If exploited, these vulnerabilities can allow unauthorized users to potentially cause a device to stop working, stop it from working correctly and/or bypass security to access certain device functions. The FDA has said it is not aware of any confirmed adverse events related to these vulnerabilities although software to exploit
Image 4 octobre 2019 BIOTRONIK Statement on the FDA’s Safety Communication “URGENT/11” On October 1, the US Food and Drug Administration (FDA) issued a Safety Communication regarding a set of cybersecurity vulnerabilities, referred to as “Urgent/11” that — if exploited by a remote attacker — may introduce risks for medical devices and hospital networks. According to the communication: “These vulnerabilities may allow anyone to remotely take control of the medical device and change its function, cause denial of service, or cause information leaks or logical flaws, which may prevent device function.” These vulnerabilities exist in a third-party software component known as IPnet
Image 4 octobre 2019 BIOTRONIK Statement on the FDA’s Safety Communication “URGENT/11” On October 1, the US Food and Drug Administration (FDA) issued a Safety Communication regarding a set of cybersecurity vulnerabilities, referred to as “Urgent/11” that — if exploited by a remote attacker — may introduce risks for medical devices and hospital networks. According to the communication: “These vulnerabilities may allow anyone to remotely take control of the medical device and change its function, cause denial of service, or cause information leaks or logical flaws, which may prevent device function.” These vulnerabilities exist in a third-party software component known as IPnet
Image 12 août 2019 Statement BIOTRONIK Statement on the Publication ‘Security Testing of the Pacemaker Ecosystem’ The work ‘Security Testing of the Pacemaker Ecosystem’ was recently published as a master’s thesis, authored by Mr. Anders Been Wilhelmsen and Mr. Eivind Skjelmo Kristiansen. This publication investigates the state of cybersecurity of BIOTRONIK’s ICS 3000 – a programmer for BIOTRONIK implantable cardiac pacemakers, defibrillators and monitors that is used by healthcare professionals during the implantation procedure and follow-ups. ICS 3000 programmers were distributed between 2001 and 2012. In the publication, the authors report about several cybersecurity weaknesses such as: The central
Image 12 août 2019 Statement BIOTRONIK Statement on the Publication ‘Security Testing of the Pacemaker Ecosystem’ The work ‘Security Testing of the Pacemaker Ecosystem’ was recently published as a master’s thesis, authored by Mr. Anders Been Wilhelmsen and Mr. Eivind Skjelmo Kristiansen. This publication investigates the state of cybersecurity of BIOTRONIK’s ICS 3000 – a programmer for BIOTRONIK implantable cardiac pacemakers, defibrillators and monitors that is used by healthcare professionals during the implantation procedure and follow-ups. ICS 3000 programmers were distributed between 2001 and 2012. In the publication, the authors report about several cybersecurity weaknesses such as: The central
Image 22 mars 2019 Statement BIOTRONIK Statement on the Medical Advisory and Safety Communication Regarding Medtronic’s Conexus Radio Frequency Telemetry Protocol The Department of Homeland Security and the US FDA have issued a Medical Advisory and Safety Communication respectively describing two types of cybersecurity vulnerabilities affecting multiple Medtronic devices that utilize the Conexus telemetry protocol. BIOTRONIK utilizes substantially different protocols for both the clinical and the home environment. Moreover, by design, the remote communication system via BIOTRONIK Home Monitoring® does not have the functionality to transmit or alter therapeutic commands to the implant.
Image 22 mars 2019 Statement BIOTRONIK Statement on the Medical Advisory and Safety Communication Regarding Medtronic’s Conexus Radio Frequency Telemetry Protocol The Department of Homeland Security and the US FDA have issued a Medical Advisory and Safety Communication respectively describing two types of cybersecurity vulnerabilities affecting multiple Medtronic devices that utilize the Conexus telemetry protocol. BIOTRONIK utilizes substantially different protocols for both the clinical and the home environment. Moreover, by design, the remote communication system via BIOTRONIK Home Monitoring® does not have the functionality to transmit or alter therapeutic commands to the implant.
Image 18 octobre 2018 Statement BIOTRONIK Statement on the Cybersecurity Updates Affecting Medtronic Implantable Cardiac Device Programmers On October 11, the US Food and Drug Administration (FDA) issued a Safety Communication regarding cybersecurity updates affecting Medtronic implantable cardiac device programmers, based on an NCCIC Advisory. 1 According to the FDA’s communication, Medtronic is issuing a software update to address a safety risk caused by cybersecurity vulnerabilities associated with the internet connection in two models of programmers used to download software from the manufacturer’s software distribution network (SDN). Successful exploitation of these vulnerabilities would allow an adversary to influence this
Image 18 octobre 2018 Statement BIOTRONIK Statement on the Cybersecurity Updates Affecting Medtronic Implantable Cardiac Device Programmers On October 11, the US Food and Drug Administration (FDA) issued a Safety Communication regarding cybersecurity updates affecting Medtronic implantable cardiac device programmers, based on an NCCIC Advisory. 1 According to the FDA’s communication, Medtronic is issuing a software update to address a safety risk caused by cybersecurity vulnerabilities associated with the internet connection in two models of programmers used to download software from the manufacturer’s software distribution network (SDN). Successful exploitation of these vulnerabilities would allow an adversary to influence this
Image 17 août 2018 Statement Statement on the Cybersecurity of BIOTRONIK Solutions Following WIRED Magazine’s Article on Vulnerabilities in Pacemaker Programmer Systems On August 9, WIRED magazine reported that researchers discovered cybersecurity vulnerabilities in the way pacemaker programmers connected to the software delivery network of a specified manufacturer. The researchers claim that “digital code signing”—the cryptographic validation of the legitimacy and integrity of software—is lacking in the manufacturer’s infrastructure, allowing an attacker to potentially take control of device programmers through malicious updates that can subsequently be spread to implanted pacemakers. 1 None of BIOTRONIK’s devices, programmers or networks are affected by
Image 17 août 2018 Statement Statement on the Cybersecurity of BIOTRONIK Solutions Following WIRED Magazine’s Article on Vulnerabilities in Pacemaker Programmer Systems On August 9, WIRED magazine reported that researchers discovered cybersecurity vulnerabilities in the way pacemaker programmers connected to the software delivery network of a specified manufacturer. The researchers claim that “digital code signing”—the cryptographic validation of the legitimacy and integrity of software—is lacking in the manufacturer’s infrastructure, allowing an attacker to potentially take control of device programmers through malicious updates that can subsequently be spread to implanted pacemakers. 1 None of BIOTRONIK’s devices, programmers or networks are affected by
Image Quatre façons de réduire le risque de fibrillation auriculaire La fibrillation auriculaire est le type d’arythmie cardiaque le plus courant et touche environ 30 millions de personnes dans le monde.
Image Quatre façons de réduire le risque de fibrillation auriculaire La fibrillation auriculaire est le type d’arythmie cardiaque le plus courant et touche environ 30 millions de personnes dans le monde.
Image Impact de la pollution atmosphérique sur la santé cardiaque Une meilleure qualité de vie, une plus grande biodiversité et un meilleur climat : les avantages des villes vertes semblent évidents. Un mode de vie écologique, y compris le fait de respirer un air pur, joue un rôle particulièrement crucial pour la santé de notre cœur et notre bien-être général. À l’occasion de la Journée mondiale de l’environnement 4, nous avons examiné l’impact de la pollution atmosphérique sur la santé cardiaque et ce que chacun d’entre nous peut faire pour rendre nos villes plus vivables.
Image Impact de la pollution atmosphérique sur la santé cardiaque Une meilleure qualité de vie, une plus grande biodiversité et un meilleur climat : les avantages des villes vertes semblent évidents. Un mode de vie écologique, y compris le fait de respirer un air pur, joue un rôle particulièrement crucial pour la santé de notre cœur et notre bien-être général. À l’occasion de la Journée mondiale de l’environnement 4, nous avons examiné l’impact de la pollution atmosphérique sur la santé cardiaque et ce que chacun d’entre nous peut faire pour rendre nos villes plus vivables.