
This whitepaper explores a critical blind spot in medical device cybersecurity — the lack of correlation between vulnerability severity and patch availability.
Analyzing data from the ICS-CERT advisory database (2013–2019), MedCrypt found that despite a 400% increase in vulnerability disclosures since FDA issued its postmarket cybersecurity guidance (2016), patching practices remain inconsistent across the industry.
The paper reveals that while patch frequency has increased by 46.5%, the CVSS score of a vulnerability has no statistical relationship with whether it gets patched. The findings emphasize the need for proactive, security-by-design architectures and continuous vulnerability management to reduce reliance on reactive patching.
Medical device security cannot depend on patching alone.
For devices embedded in critical care environments or implanted in patients, patching can introduce new risks — downtime, data loss, or interference with clinical workflows.
Yet, FDA guidance explicitly requires manufacturers to design devices that “anticipate software patches” and support secure, rapid updates.
This whitepaper helps manufacturers and regulators understand: