
"Our commitment to security ". With hard coded admin password. Are you kidding us?
Security specialist Armis has discovered vulnerabilities, collectively dubbed PwnedPiper, in pneumatic tube control systems used in thousands of hospitals worldwide – including 80 per cent of the major hospitals found in the US. The researcher spotted the PwnedPiper vulnerabilities in Swisslog's Nexus stations for its …
"if a bad actor was first able to successfully break into a hospital’s secure network, know and understand the pathway from there to the panel, and then leverage the vulnerabilities."
So they're saying "nobody's smart enough to do it" anyway. Nice.
Assholes. But then in that case, they fit right in with the American medical system.
Telnet is still widely used, particularly the TN3270 / TN3270E variants1 with z systems, and in somewhat smaller numbers the Telnet variants for other mainframe-class systems such as i and Unisys ClearPath.
Telnet can be used securely when tunneled over TLS, or even using "opportunistic TLS" (STARTTLS) provided both sides enforce it (so a MITM can't downgrade to plaintext). There's also Thomas Wu's SRP-enabled Telnet, which offers not only message confidentiality and integrity but ZKP authentication; it's less widely available but there are both clients and servers.
1Technically, TN3270 is "regular" Telnet with various options such as Binary and EOR enabled during negotiation. TN3270E negotiates a single more-complex option with various sub-options, and then adds a header to the Telnet records. Both use EBCDIC once negotiation completes and are significantly different from NVT mode, but TN3270E is more different.