DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

DocuTrac medical software is a breach risk, warns Rapid7

Posted on March 15, 2018 by Dissent

Warwick Ashford reports on what seems to me to be yet another case of hard-coded credentials creating a critical vulnerability in protecting patient data, and I, of course, have questions. Ashford reports:

The QuicDoc & Office Therapy suite of software produced by DocuTrac contains security vulnerabilities that could allow attackers to gain control of patient data, warns security firm Rapid7.

[…]

According to Rapid7, the software contains a number of static accounts that are not disclosed to the end-user, and are identical across all installations of the medical records software.

Read more on ComputerWeekly.  I looked to see what DocuTrac claimed about HIPAA compliance and found the following on their site:

Our practice management and clinical documentation software for behavioral health providers has HIPAA compliant features for the security of protected health information (PHI). DocuTrac’s HIPAA features whether Cloud or Client-Server based include secure access, audit log tracking for internal audits, and a disclosure of protected information log to record and track all PHI disclosures. Our practice management software uses HIPAA compliant files for electronic claims and contains HIPAA compliant procedure and diagnosis codes.

We ensure all our electronic medical records software, electronic health record software, medical billing software, practice management software, and e-prescribing software are HIPAA compliant to assist healthcare organizations in protecting their sensitive data.

But is it really HIPAA-compliant if there are hard-coded credentials?  Or are there other safeguards that they incorporate that somehow minimize the concern over hard-coded credentials? I’d love to have an expert explain that to me.

As to the time to disclosure, Ashford reports:

Although DocuTrac was alerted to the vulnerabilities on 9 January 2018 and two subsequent communications via telephone and email, no software update had been issued by 14 March, when Rapid7 went public with the vulnerabilities.

Was QuicDoc given enough time to remedy the problem before Rapid7 went public? How long should they have been given to address the issue? Regardless of whether you think that the issue never should have occurred, if it did occur, what would be a reasonable amount of time to address it before it was disclosed?

Category: Commentaries and AnalysesHealth DataU.S.

Post navigation

← Nampa School District investigating cyber security breach
OAIC received 31 notifications in the first three weeks of data breach scheme →

2 thoughts on “DocuTrac medical software is a breach risk, warns Rapid7”

  1. kilgore says:
    March 16, 2018 at 8:40 pm

    I think 90 days notification before disclosure is a good starting point, which should be clearly communicated up front. If it can be shown a true good faith effort is being made to address the vulnerability, perhaps adjustments can be made to the timeline.

    It’s hard to tell here if this was reasonable public disclosure as there’s no mention of DocuTrac’s efforts to address the issues. No patch was released in 60 days, but we don’t know if they were close to having one – or if they simply blew off Rapid7’s communications.

    1. Dissent says:
      March 16, 2018 at 9:10 pm

      So suppose the government had the ability (and had exercised it) to take enforcement action and DocuTrac goes to settle the government’s complaint. In how many days would they agree to patch, I wonder? What would the government say is reasonable? Sixty days? Ninety? Sometime before the end of my life?

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.