There’s no evidence to suggest malicious hackers have exploited the vulnerability, but a hacker could use it to gain access to patient health data held in the devices and even alter such data, according to the cybersecurity company that found the issue.
There’s no evidence to suggest malicious hackers have exploited the vulnerability, but a hacker could use it to gain access to patient health data held in the devices and even alter such data, according to the cybersecurity company that found the issue.