Stryker Medical Beds
This advisory addresses KRACK (Key Reinstallation AttaCK) vulnerabilities in the wireless connectivity of Stryker medical beds. These vulnerabilities allow attackers to manipulate encrypted data traffic, potentially disclosing or injecting data in wireless communications between the bed and hospital network infrastructure. The vulnerability affects S3 MedSurg Bed, Secure II MedSurg Bed, and InTouch ICU Bed models equipped with iBed Wireless or Bed Wireless functionality. Exploitation requires proximity to the wireless network (adjacent network access) and high technical skill.
- Proximity to the hospital wireless network (adjacent network access, typically within ~100 meters)
- High technical skill to execute KRACK attack
- iBed Wireless or Bed Wireless feature enabled on the affected bed model
- Target bed must be actively communicating over wireless
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0b1078d6-f3d6-4781-b867-fa294884dcecGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.