Southeastern U.S. Hospital: HHS-OIG Identifies Web Application Security Weaknesses at Large U.S. Hospital

Southeastern U.S. Hospital: HHS-OIG Identifies Web Application Security Weaknesses at Large U.S. Hospital

HHS-OIG Audit Reveals Critical Web Application Security Gaps at Major U.S. Hospital

A recent audit by the Department of Health and Human Services Office of Inspector General (HHS-OIG) uncovered significant security vulnerabilities in internet-facing applications at a large Southeastern U.S. hospital, raising concerns about similar risks across the healthcare sector. The audit, conducted to evaluate cybersecurity controls, continuity of care during cyberattacks, and protection of Medicare enrollee data, found that while the hospital had implemented foundational safeguards, critical weaknesses persisted.

The 300+ bed hospital, part of a network sharing protected health information (PHI), adhered to the HITRUST Common Security Framework (CSF) v9.4 and HIPAA Rules for compliance. However, penetration tests and vulnerability assessments on four of its web applications revealed exploitable flaws:

  • Credential Capture & Account Compromise: HHS-OIG successfully obtained login credentials via a phishing simulation, with 108 of 2,171 recipients (6%) clicking the malicious link and one user submitting credentials. While the compromised account lacked direct patient data, it allowed access to device management controls, including the ability to disable multifactor authentication (MFA) and modify account-linked devices.
  • Injection Attack Vulnerability: A separate application lacked input validation controls, enabling potential code injection attacks that could manipulate system commands or exfiltrate sensitive data. Despite prior vulnerability scans and third-party tests, the flaw went undetected, and the application lacked a web application firewall (WAF) to block malicious traffic.

The audit resulted in four key recommendations:

  1. Strengthen user identification and authentication (UIA) controls for the account management application.
  2. Regularly assess and update UIA controls across all systems.
  3. Evaluate all web applications for the need for automated protections like WAFs.
  4. Expand vulnerability testing to include dynamic, static, and manual application testing.

HHS-OIG did not disclose the hospital’s identity to avoid targeting by threat actors but indicated plans for additional audits to identify systemic issues and improve HHS guidance for healthcare providers.

Industry experts, including Russell Spitler (CEO of Nudge Security), emphasized the shift in healthcare cybersecurity risks, noting that traditional network-focused controls fail to protect cloud-based SaaS applications, where data flows across organizational boundaries. Spitler highlighted the need for comprehensive visibility and strong authentication (e.g., MFA, SSO) to secure evolving attack surfaces.

Source: https://www.hipaajournal.com/hhs-oig-web-application-security-weaknesses-audit-large-hospital/

UNC Health Southeastern cybersecurity rating report: https://www.rankiteo.com/company/unc-health-southeastern

"id": "UNC1770223081",
"linkid": "unc-health-southeastern",
"type": "Vulnerability",
"date": "2/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Medicare enrollees, patients '
                                              'sharing PHI',
                        'industry': 'Healthcare',
                        'location': 'Southeastern U.S.',
                        'size': '300+ beds',
                        'type': 'Hospital'}],
 'attack_vector': ['Phishing', 'Code Injection'],
 'data_breach': {'personally_identifiable_information': 'Yes',
                 'sensitivity_of_data': 'High (PHI, Medicare enrollee data)',
                 'type_of_data_compromised': ['Protected health information '
                                              '(PHI)',
                                              'Login credentials',
                                              'Device management controls']},
 'description': 'A recent audit by the Department of Health and Human Services '
                'Office of Inspector General (HHS-OIG) uncovered significant '
                'security vulnerabilities in internet-facing applications at a '
                'large Southeastern U.S. hospital, raising concerns about '
                'similar risks across the healthcare sector. The audit found '
                'exploitable flaws, including credential capture via phishing '
                'and injection attack vulnerabilities, despite compliance with '
                'HITRUST CSF and HIPAA.',
 'impact': {'brand_reputation_impact': 'Potential reputational damage due to '
                                       'security gaps',
            'data_compromised': 'Potential access to device management '
                                'controls and protected health information '
                                '(PHI)',
            'identity_theft_risk': 'Risk of identity theft due to compromised '
                                   'credentials',
            'legal_liabilities': 'Potential HIPAA violations',
            'operational_impact': 'Risk of disabling multifactor '
                                  'authentication (MFA) and modifying '
                                  'account-linked devices',
            'systems_affected': ['Web applications',
                                 'Account management systems']},
 'investigation_status': 'Audit completed, recommendations issued',
 'lessons_learned': 'Healthcare organizations must strengthen UIA controls, '
                    'evaluate WAFs for web applications, and expand '
                    'vulnerability testing to include dynamic, static, and '
                    'manual methods. Traditional network-focused controls are '
                    'insufficient for securing cloud-based SaaS applications.',
 'post_incident_analysis': {'corrective_actions': ['Strengthen UIA controls',
                                                   'Evaluate WAF '
                                                   'implementation',
                                                   'Expand vulnerability '
                                                   'testing'],
                            'root_causes': ['Lack of input validation controls',
                                            'Insufficient UIA controls',
                                            'Absence of WAF',
                                            'Inadequate vulnerability '
                                            'testing']},
 'recommendations': ['Strengthen user identification and authentication (UIA) '
                     'controls for the account management application.',
                     'Regularly assess and update UIA controls across all '
                     'systems.',
                     'Evaluate all web applications for the need for automated '
                     'protections like WAFs.',
                     'Expand vulnerability testing to include dynamic, static, '
                     'and manual application testing.'],
 'references': [{'source': 'Department of Health and Human Services Office of '
                           'Inspector General (HHS-OIG)'},
                {'source': 'Russell Spitler, CEO of Nudge Security'}],
 'regulatory_compliance': {'regulations_violated': ['Potential HIPAA '
                                                    'violations'],
                           'regulatory_notifications': 'HHS-OIG audit and '
                                                       'recommendations'},
 'response': {'adaptive_behavioral_waf': 'Recommended evaluation of web '
                                         'application firewalls (WAFs)',
              'enhanced_monitoring': 'Recommended expansion of vulnerability '
                                     'testing (dynamic, static, and manual '
                                     'application testing)',
              'third_party_assistance': 'Penetration tests and vulnerability '
                                        'assessments conducted by HHS-OIG'},
 'stakeholder_advisories': 'HHS-OIG plans additional audits to identify '
                           'systemic issues and improve guidance for '
                           'healthcare providers.',
 'title': 'HHS-OIG Audit Reveals Critical Web Application Security Gaps at '
          'Major U.S. Hospital',
 'type': 'Data Security Audit',
 'vulnerability_exploited': ['Lack of input validation controls',
                             'Insufficient user identification and '
                             'authentication (UIA) controls',
                             'Absence of web application firewall (WAF)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.