MedDeviceGuideMedDeviceGuide
Back

Medical Device Cybersecurity Penetration Testing & Vulnerability Assessment: FDA & EU MDR Requirements for 2026

FDA's February 2026 cybersecurity guidance and Section 524B of the FD&C Act make penetration testing, vulnerability scanning, and fuzz testing mandatory evidence for connected medical device submissions. This guide covers what testing is required, how to structure results, common FDA deficiencies, EU MDR cybersecurity expectations, and how to build a testing program that satisfies both regulatory frameworks.

Ran Chen
Ran Chen
Global MedTech Expert | 10× MedTech Global Access
2026-04-2915 min read

Why Cybersecurity Testing Is Now a Regulatory Gatekeeper

On February 3, 2026, the FDA reissued its final guidance "Cybersecurity in Medical Devices: Quality Management System Considerations and Content of Premarket Submissions," aligning it with the new Quality Management System Regulation (QMSR). The guidance builds on Section 524B of the FD&C Act (enacted via FDORA in December 2022), which made cybersecurity documentation a legal requirement for "cyber devices" — defined broadly as any device with software that can connect to the internet, including via USB, Bluetooth, serial ports, NFC, or Wi-Fi.

The FDA has identified 479 vulnerabilities and managed 17 safety alerts through its cybersecurity team. In 2026 submissions, the most common reason for cybersecurity-related delays is insufficient penetration testing evidence — not missing documentation, but testing that fails to demonstrate real-world device resilience.

In the EU, cybersecurity is evaluated through MDR general safety and performance requirements (GSPRs), clinical evaluation, and risk management. Notified Bodies increasingly scrutinize cybersecurity testing evidence during conformity assessments, and weak linkage between cybersecurity controls and patient safety is a frequent audit finding.

What the FDA Requires in Premarket Submissions

The Testing Triad

The FDA expects three categories of cybersecurity testing evidence:

Testing Type Purpose What It Demonstrates
Penetration testing Simulate real-world attacks against the device Device can withstand adversarial exploitation attempts
Vulnerability scanning Systematically identify known vulnerabilities All software components are assessed against known CVEs
Fuzz testing Feed malformed or unexpected data to device inputs Device handles unexpected input gracefully without safety-critical failure

Penetration Testing Requirements

Penetration testing must be performed on the final, production-equivalent version of the device. The FDA is explicit about this in recent deficiency trends — testing on prototypes or development builds is insufficient.

A compliant penetration test must:

  • Cover all system elements, not just the regulated software component — including mobile apps, cloud backends, hospital network interfaces, and any third-party integrations
  • Test all communication channels — Bluetooth/BLE, Wi-Fi, USB, Ethernet, HL7, DICOM, proprietary RF protocols
  • Address all five security objectives — authenticity, authorization, availability, confidentiality, and secure updatability
  • Be conducted by qualified testers with medical device or embedded systems expertise (general IT pen testing is not sufficient)
  • Document findings with risk disposition — every finding must have a documented mitigation, acceptance rationale, or "by-design" justification

Testing Approaches: White-Box, Gray-Box, and Black-Box

The FDA does not prescribe a specific testing methodology, but reviewer experience shows a clear preference hierarchy:

Approach Description FDA Acceptance
White-box Testers have full access to source code, architecture documents, and design specifications Preferred — enables deepest analysis
Gray-box Testers have partial knowledge (e.g., architecture views, API documentation) Acceptable — common in practice
Black-box Testers have no internal knowledge, testing from outside only Insufficient alone — may be flagged

The FDA values white-box and gray-box testing because medical device vulnerabilities often exist in the interaction between software components, communication protocols, and safety-critical functions — areas that black-box testing alone cannot reach. Most successful submissions use a gray-box or combined approach.

UL 2900-2-1 Alignment

Although the FDA does not explicitly mandate UL 2900-2-1 ("Standard for Software Cybersecurity for Network-Connectable Products, Part 2-1: Particular Requirements for Medical Devices"), structuring your testing against this standard pre-empts reviewer follow-up questions. UL 2900-2-1 provides a structured framework for:

  • Risk-based vulnerability assessment
  • Penetration testing methodology
  • Software bill of materials analysis
  • Threat mitigation verification

Manufacturers who align their testing methodology with UL 2900-2-1 report smoother FDA reviews, as the standard's output maps directly to the FDA's premarket submission expectations.

CVSS vs. ISO 14971: Don't Mix Your Risk Scoring

A common mistake is using CVSS (Common Vulnerability Scoring System) scores to assess patient safety impact. The FDA expects separate assessments:

  • CVSS — Measures technical severity of a vulnerability (exploitability, impact on confidentiality/integrity/availability). Used for cybersecurity risk prioritization.
  • ISO 14971 — Assesses clinical patient harm probability and severity. Used for safety risk management.

These are fundamentally different frameworks. A vulnerability with a high CVSS score may have low clinical impact (e.g., an information disclosure bug that does not affect therapy delivery). Conversely, a low-severity technical vulnerability could have high patient safety impact if it affects a safety-critical function.

Every cybersecurity finding should be scored using both frameworks independently. The penetration testing report documents the CVSS score. The security risk management file documents the ISO 14971 patient safety assessment.

Common Vulnerability Patterns in Medical Devices

Based on FDA deficiency data and industry testing experience, these vulnerability categories account for the majority of findings:

Vulnerability Pattern Frequency Example
Authentication failures ~60% of findings Hardcoded credentials in firmware, default admin accounts, weak password policies
Unencrypted communications Common DICOM, HL7, and proprietary protocols transmitted in cleartext
Improper input validation Common Buffer overflows in firmware update mechanisms, malformed HL7 message handling
Insufficient access controls Common Privilege escalation from user-level to admin-level functions
Insecure update mechanisms Common No code signing verification, unsigned firmware updates
Infusion pump vulnerabilities Notable Dose manipulation through wireless interface, alarm suppression
Implantable device risks Notable Battery drain attacks, therapy disruption via unauthorized commands

Engineering teams should proactively address these patterns during design rather than waiting for testing to find them.

Tester Credentials and Report Timeliness

The FDA expects penetration test reports to document:

  • Tester qualifications (certifications, relevant experience with medical devices or embedded systems)
  • Testing tools and equipment used
  • Testing methodology and scope
  • Date of testing — reports older than one year may be questioned during review

Medical device penetration testing requires specialized expertise beyond general IT security. Testers should understand real-time operating systems, safety-critical software constraints, healthcare network protocols (HL7, DICOM), and the unique threat model of connected medical devices. Expect to pay a 20–50% premium over general IT pen testing for this specialization.

What the FDA Is Actually Flagging in 2026

Based on publicly reported deficiency trends from FDA reviewers in 2026:

  1. Unresolved penetration test findings — Even "Low" or "Medium" risk findings without documented mitigation or acceptance criteria trigger requests for additional information (RFAI)
  2. Missing retest evidence — If a High-risk finding was mitigated, the FDA expects to see retest results confirming the fix
  3. Incomplete SBOM disclosure — SBOMs must include software support level, end-of-support dates, and cross-reference against CISA's Known Exploited Vulnerabilities Catalog
  4. Missing Appendix 1 controls — The premarket guidance Appendix 1 lists 8 control categories that FDA treats as a de facto checklist: authentication, authorization, cryptography, code/data integrity, confidentiality, event detection/logging, resiliency, and updatability

Required Documentation for FDA Submissions

Document Key Contents
Security Risk Management Report Threat model, risk assessment, residual risk conclusions, mitigation activities
SBOM (Software Bill of Materials) All components, versions, suppliers in SPDX or CycloneDX format; support levels; known vulnerabilities
Vulnerability Management Plan Coordinated vulnerability disclosure (CVD) procedures, triage timelines, notification plan, patch commitments
Cybersecurity Testing Report Penetration test results, vulnerability scan results, fuzz testing outcomes, retest evidence
Secure Development Documentation SPDF compliance evidence, security requirements, design controls, verification evidence

EU MDR Cybersecurity Testing Expectations

How EU Requirements Differ

The EU MDR does not prescribe specific cybersecurity testing methodologies in the way the FDA does. Instead, cybersecurity is evaluated through:

  • GSPR compliance (Annex I) — cybersecurity risks must be managed as part of general safety and performance
  • Risk management file (ISO 14971) — cybersecurity risks must be integrated and linked to patient harm scenarios
  • Clinical evaluation — cybersecurity must be considered as a factor affecting clinical safety and performance
  • Post-market surveillance — ongoing vulnerability monitoring and incident response

What Notified Bodies Expect in Practice

Despite the absence of prescriptive testing rules, Notified Bodies increasingly expect manufacturers to demonstrate:

  • Evidence of penetration testing or equivalent security assessment
  • Vulnerability scanning results covering all software components
  • Integration of cybersecurity findings into the ISO 14971 risk management file
  • Clear linkage between cybersecurity controls, patient safety scenarios, and clinical impact
  • Documented vulnerability monitoring and patch management processes as part of PMS

Common audit findings in EU conformity assessments include weak linkage between cybersecurity controls and patient safety outcomes, and insufficient evidence that post-market vulnerability monitoring is operational.

IEC 81001-5-1 as the Bridge Standard

IEC 81001-5-1:2021 "Health software and health IT systems — Security activities in the product lifecycle" is emerging as the de facto standard that bridges FDA and EU expectations. It provides a lifecycle framework for security activities that maps to both ISO 13485 quality system requirements and ISO 14971 risk management.

Manufacturers who align their cybersecurity testing with IEC 81001-5-1 are well-positioned for both FDA and EU submissions.

Recommended Reading
GDPR Compliance for Medical Device and IVD Companies: A Practical Guide to EU Data Protection in 2026
EU MDR / IVDR Regulatory2026-04-23 · 15 min read

Building a Cybersecurity Testing Program

Scope Definition

Before testing begins, define the scope to cover:

  1. Device hardware — physical access risks, debug ports (JTAG, UART), tamper evidence
  2. Embedded software and firmware — code vulnerabilities, authentication flaws, privilege escalation
  3. Network communication — encryption analysis, protocol vulnerabilities, man-in-the-middle scenarios
  4. Mobile and cloud integration — API security, authentication flows, data storage, remote access
  5. Hospital network interaction — segmentation bypass, lateral movement testing, integration with HL7/DICOM systems
  6. Real-time operating system (RTOS) — low-level firmware interactions, safety-critical operation impacts

Threat Modeling Before Testing

The FDA requires a separate threat model from the ISO 14971 safety risk assessment. Threat modeling should:

  • Use exploitability-based methods (not probabilistic) — focus on whether a vulnerability can be exploited, not the likelihood
  • Consider multi-patient harm scenarios (e.g., one compromised device affecting multiple patients via network)
  • Address all communication interfaces and data flows
  • Identify trust boundaries between device components, cloud services, and hospital systems
  • Feed directly into the security risk management report

Recommended threat modeling frameworks: STRIDE, Attack Trees, or PASTA.

Testing Methodology

Penetration Testing

Phase Activity
Reconnaissance Identify all attack surfaces, communication protocols, exposed services
Vulnerability analysis Map attack surface to known vulnerability classes and CVE databases
Exploitation Attempt to exploit identified vulnerabilities following documented methodology
Post-exploitation Assess impact of successful compromise on device safety functions
Reporting Document all findings with severity, impact, and recommended mitigations

Vulnerability Scanning

  • Use automated tools (e.g., Nessus, OpenVAS, Qualys) against all software components
  • Cross-reference SBOM against NVD, CISA KEV, and vendor security advisories
  • Document all findings including CVE IDs, CVSS scores, and device-specific impact assessment
  • Include both the device firmware/software and any connected mobile apps or cloud services

Fuzz Testing

  • Target all device input channels: network protocols, file parsers, API endpoints, USB/serial interfaces
  • Use both protocol-aware and protocol-agnostic fuzzing approaches
  • Run for sufficient duration to achieve meaningful code path coverage
  • Document all crashes, hangs, or unexpected behaviors with root cause analysis

Managing Test Results

Every finding from penetration testing, vulnerability scanning, or fuzz testing must be dispositioned through the security risk management process:

Finding Severity Required Action
Critical / High Must be mitigated before submission; retest evidence required
Medium Must be mitigated or formally accepted with documented rationale
Low Must be documented; acceptance rationale recommended

The FDA expects to see a direct trace from each finding to a risk assessment entry, and from there to either a mitigation action or a documented acceptance with justification.

Security Architecture Documentation

The FDA requires four specific architecture views in premarket submissions:

View What It Shows
Global system view All system components, data flows, trust boundaries, and external interfaces
Multi-patient harm view How the device interacts with other devices and systems where compromise could affect multiple patients
Updateability/patchability view How software updates and patches are delivered, verified, and installed; rollback capabilities
Security use case view How security controls are applied in normal and adversarial use scenarios

These views should be generated as part of the design control process (ISO 13485 Subclause 7.3) and maintained in the Design History File.

Common Reasons for FDA Cybersecurity Delays

Issue Frequency How to Avoid
Unresolved pen test findings without documented acceptance Very high Disposition every finding through risk management; document acceptance rationale
Missing retest for mitigated High findings High Include retest evidence in the submission package
SBOM missing support levels or KEV cross-reference High Use NTIA minimum elements plus support level and CISA KEV check
Missing Appendix 1 controls without justification Medium Audit against all 8 control categories; justify any gaps
Testing on non-production-equivalent build Medium Test on final or production-equivalent version only
Threat model not connected to risk management file Medium Create explicit traceability between threat model and ISO 14971 risk file
Recommended Reading
FDA Cybersecurity Guidance Updated for QMSR (February 2026): What Medical Device Manufacturers Must Change
Digital Health & AI Quality Systems2026-04-28 · 10 min read

EU vs. FDA Cybersecurity Testing: Convergence and Differences

Dimension FDA EU MDR
Legal basis Section 524B FD&C Act GSPR (Annex I) + ISO 14971
Testing specificity Prescriptive (pen testing, fuzz, vuln scanning) Principles-based (risk management driven)
SBOM requirement Legally required for cyber devices Expected as part of technical documentation
Submission documentation Structured in guidance appendices Integrated across technical file
Post-market Coordinated vulnerability disclosure plan required PMS plan must include cyber monitoring
Enforcement RTA decisions for missing cyber documentation Notified Body findings during assessment
Convergence point Both expect lifecycle cybersecurity management integrated into QMS and risk management

Manufacturers targeting both markets should build one unified cybersecurity testing program that satisfies FDA prescriptive requirements (which are the higher bar) while ensuring the documentation structure also supports EU technical file organization.

Cost and Timeline Considerations

Testing Activity Simple Devices Complex/Connected Devices Timeline
Penetration testing $10,000–$30,000 $30,000–$100,000+ 4–8 weeks
Retesting (after remediation) $5,000–$15,000 (50–70% of initial) $15,000–$70,000 (50–70% of initial) 2–4 weeks
Vulnerability assessment $10,000–$25,000 $15,000–$40,000 2–4 weeks
Fuzz testing $10,000–$30,000 $20,000–$60,000 3–6 weeks
Threat modeling $10,000–$20,000 $15,000–$30,000 2–4 weeks
SBOM compilation and analysis $5,000–$10,000 $5,000–$15,000 1–2 weeks
Documentation preparation $10,000–$25,000 $15,000–$40,000 3–6 weeks
Total program $60,000–$175,000 $115,000–$335,000 8–16 weeks

Note: Medical device specialization adds a 20–50% premium over general IT penetration testing costs.

These costs are significantly lower than the cost of an FDA Refuse-to-Accept decision or submission delay, which can add 6–12 months and $200,000–$500,000+ to a product launch timeline.

Practical Steps for Manufacturers

If You Are Preparing a Submission Now

  1. Audit your penetration test against the criteria above — ensure it covers all system elements, not just the device firmware
  2. Disposition every finding through your security risk management process
  3. Retest any mitigated High/Critical findings and include retest evidence
  4. Verify your SBOM includes support levels, end-of-support dates, and CISA KEV cross-reference
  5. Map your documentation to the FDA guidance Appendix 1 checklist

If You Are Starting a New Development Project

  1. Integrate cybersecurity into your ISO 13485 design controls from the start
  2. Conduct threat modeling during design input phase, not at the end
  3. Budget for cybersecurity testing as a line item in your development plan
  4. Select testing partners with medical device or embedded systems expertise
  5. Build your SBOM as a living document, updated with each software release

If You Have Devices Already on the Market

  1. Conduct a gap assessment against current FDA and EU cybersecurity expectations
  2. Implement vulnerability monitoring processes as part of your PMS plan
  3. Develop a coordinated vulnerability disclosure program
  4. Plan for post-market cybersecurity testing as part of device lifecycle management
  5. Prepare for FDA inspections that may test cybersecurity processes under the new QMSR inspection manual (CP 7382.850)
Recommended Reading
Internet of Medical Things (IoMT): Regulatory Compliance, Cybersecurity, and Market Access Guide
Digital Health & AI Cybersecurity2026-04-21 · 37 min read

Sources and References

  • FDA, "Cybersecurity in Medical Devices: Quality Management System Considerations and Content of Premarket Submissions" (Final Guidance, February 2026)
  • Section 524B, Federal Food, Drug, and Cosmetic Act (FDORA, December 2022)
  • FDA Compliance Program Manual #7382.850 (effective February 2026)
  • IEC 81001-5-1:2021 — Health software security activities in the product lifecycle
  • ISO 14971:2019 — Medical devices — Application of risk management to medical devices
  • EU MDR Regulation (EU) 2017/745, Annex I (GSPRs)
  • MITRE, "Cybersecurity Risk Analysis for Medical Devices in the Era of Evolving Technologies" (April 2026)
  • MITRE, "Considerations for Managing Challenges in Software Bill of Materials (SBOM) Data Normalization" (April 2026)
  • CISA Known Exploited Vulnerabilities Catalog

Related Articles

EU MDR / IVDRClinical Evidence

EU MDR Well-Established Technologies (WET): Expanded Device List 2026 — Delegated Acts C(2026) 1798 & 1809

On March 20, 2026, the European Commission adopted two delegated regulations expanding the Well-Established Technology (WET) list under EU MDR. C(2026) 1798 exempts additional implantable and Class III devices from clinical investigations. C(2026) 1809 simplifies conformity assessment for Class IIb implantable devices. This guide covers what changed, which devices qualify, WET criteria, and practical steps for manufacturers.

2026-04-29·12 min read
RegulatoryDigital Health & AI

Health Canada Medical Device Regulation Reform 2026: Terms & Conditions, AI/ML Guidance, REP, and Lifecycle Oversight

Health Canada's 2026 regulatory reforms introduce expanded Terms & Conditions (T&C) powers for Class II–IV devices, new AI/ML-enabled medical device guidance, mandatory Regulatory Enrolment Process (REP), IMDRF Table of Contents requirements, and updated significant change guidance. This guide covers every major change effective January–April 2026 and what foreign manufacturers must do to maintain Canadian market access.

2026-04-29·13 min read
Reimbursement & Market AccessRegulatory

CMS-FDA RAPID Coverage Pathway: Fast-Track Medicare Coverage for Breakthrough Devices

On April 23, 2026, CMS and FDA announced the RAPID pathway — a new initiative that could deliver Medicare national coverage within 60–90 days of FDA authorization for eligible Breakthrough Devices. This guide explains eligibility requirements, how the pathway works, IDE study design implications, and what manufacturers must do to prepare.

2026-04-28·11 min read