Skip the navigation

HealthCare.gov still has major security problems, experts say

Democrats question whether outside security experts can tell what defenses are being deployed

By Grant Gross
January 16, 2014 02:14 PM ET

IDG News Service - HealthCare.gov remains riddled with security vulnerabilities and is ripe for ID theft three and a half months after its launch, two cybersecurity experts told U.S. lawmakers Thursday.

But a third cybersecurity expert and Democratic members of the U.S. House of Representatives Science, Space and Technology Committee questioned those warnings, saying Republican critics of the Affordable Care Act, the 2010 law with HealthCare.gov as its insurance-shopping centerpiece, are trying to scare U.S. residents and keep them from using the site.

Still, security at HealthCare.gov appears to have gotten worse in the past two months, said David Kennedy, CEO of TrustedSEC, a cybersecurity consulting firm. Since Kennedy first talked to the committee in November, he and other security researchers discovered multiple vulnerabilities, he said, through passive scans of the website.

"The website is not getting any better," he said. "TrustedSec's opinion still holds strong that the website fails to meet even basic security practices for protecting sensitive information of individuals and does not provide adequate levels of protection for the website itself."

Security researchers have found 18 possible security problems at HealthCare.gov, including JSON (JavaScript Object Notation) injection, unsanitized URL redirection, user profile disclosures, cookie theft and exposed sensitive APIs (application programming interfaces), Kennedy said. "I don't understand how we're still discussing whether the website is insecure or not," he said. "It is, there's no question about that."

With HHS rushing last year to launch the site Oct. 1, it's "hard to believe" that HealthCare.gov wouldn't suffer from many of the same security problems that commercial websites encounter, added Michael Gregg, CEO of IT security firm Superior Solutions.

"To think that HealthCare.gov could be built so quickly and then be secured, to me is very hard to believe," he said.

But none of the witnesses at Thursday's hearing has insider access to HealthCare.gov or the security measures taken by the U.S. Health and Human Services Centers for Medicare and Medicaid Services (CMS), the agency running HealthCare.gov, and its security contractors, noted Rep. Eddie Bernice Johnson (D-Texas). CMS has reported no majorĀ  security breaches at the site, she said.

"If none of us here built HealthCare.gov, if ... we're not doing penetrations and running that exploitable code on HealthCare.gov, we can only speculate whether or not those attacks will work," said Waylon Krush, cofounder and CEO of IT security firm Lunarline. "Nobody here, at this table, can tell you that they know there's vulnerabilities."

CMS has reported meeting several federal government security standards, some of which surpass most security measures taken at private companies, Krush added.

While critics of the website may see it as a prime target for hackers, it may not be, Krush said. Hackers may be more interested in intellectual property, military secrets and in commercial credit card information than the limited information available through HealthCare.gov, he said.

Reprinted with permission from IDG.net. Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies