CISA Warns of WHILL C2 Wheelchairs Vulnerability

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

CISA warns of WHILL C2 wheelchairs vulnerability that could allow attackers to remotely manipulate device functions and compromise user safety. The vulnerability affects both firmware and software, potentially enabling malicious actors to alter movement controls or disable safety features. Network connectivity could be exploited to reach devices without physical access. The advisory emphasizes the risk to both users and healthcare providers managing fleets of powered wheelchairs. The warning highlights the broader concerns around connected medical devices and the importance of firmware updates, secure configuration, and network segmentation to prevent exploitation.

Who is affected

Users of WHILL Model C2 wheelchairs, healthcare providers managing these devices, and organizations with connected mobility solutions are directly impacted. Facilities using networked wheelchairs, such as hospitals or assisted-living centers, may face operational disruption or safety incidents. Vendors and integrators of medical devices must ensure that firmware updates and proper access controls are in place to prevent unauthorized manipulation.

Why CISOs should care

Medical and assistive devices present unique security risks. Exploitable vulnerabilities may endanger patient safety, create liability concerns, and serve as potential attack vectors into broader healthcare networks. CISOs must consider device security within operational and patient safety contexts, enforcing proper segmentation, patching, and access policies.

3 practical actions

  1. Patch management: Apply vendor firmware and software updates immediately.
  2. Network segmentation: Isolate medical devices from general enterprise networks.
  3. Risk assessment: Conduct risk evaluations for all connected medical devices and mobility solutions.