Dental practice software maker fixes bug that exposed patients’ medical records

by Chief Editor

The Rise of the “Accidental” Security Researcher

For years, the world of cybersecurity was the domain of elite hackers and professional penetration testers. However, a shifting trend is emerging: the “accidental” researcher. These are regular consumers who stumble upon massive security flaws not through malicious intent, but through simple curiosity or routine utilize of a service.

Take the recent case of Joseph R. Cox, a patient who discovered a critical vulnerability while simply viewing his own dental records. By noticing that document numbers in the web address were sequentially incremental, he realized that changing a single digit allowed him to access the private medical histories, personal information, and photo identification of other patients.

From Instagram — related to Reporting Vacuum, Home Improvement

This highlights a growing reality for modern businesses. Your first line of defense is no longer just your IT department; it is every single person with a login to your portal. When users find these gaps, the relationship between the consumer and the company is position to the ultimate test.

Did you know? The flaw described—where changing a URL parameter allows access to another user’s data—is known in the industry as an Insecure Direct Object Reference (IDOR). It is one of the most common yet devastating security oversights in web applications.

The Danger of the “Reporting Vacuum”

Finding a bug is only half the battle; the real crisis occurs when there is no way to report it. We are seeing an alarming trend of “reporting vacuums,” where companies provide no discernible avenue for security disclosures. In the case of Practice by Numbers, the company’s website email was broken, and messages sent to founders via LinkedIn went unanswered.

This is not an isolated incident. Similar patterns have appeared across various industries:

  • Retail: The fashion retailer Express recently fixed a bug that exposed customer order details after a user struggled to find a way to alert the company.
  • Home Improvement: Home Depot reportedly ignored reports from a security researcher regarding a lapse that exposed internal systems for nearly a year, only acting after media intervention.

When companies ignore or fail to provide a communication channel, they push well-meaning users toward the media. This transforms a private patch into a public relations disaster.

The Shift Toward Vulnerability Disclosure Programs (VDPs)

The future of corporate security lies in the adoption of formal Vulnerability Disclosure Programs (VDPs). Rather than relying on a generic “Contact Us” email, forward-thinking companies are creating dedicated portals where researchers can safely report flaws without fear of legal retaliation.

Solve Your Problem – Dental Practice Management Software

While Practice by Numbers has stated they plan to update their website to allow for security reporting, the lack of a specific timeline underscores a wider industry lag in prioritizing these communication pipelines.

Healthcare SaaS: The High Stakes of “Bundled” Software

The vulnerability in the Practice by Numbers portal—used in over 5,000 dental practices across the U.S.—reveals the systemic risk of bundled healthcare software. When a single software provider manages portals for thousands of clinics, a single bug becomes a force multiplier for data exposure.

In this instance, the software housed highly sensitive data, including medical documents and photo IDs. While the company’s CTO, Chris Lau, noted that server logs suggested fewer than 10 patients were exposed, the potential for damage was immense.

Pro Tip for Business Owners: If you use third-party SaaS for patient or customer data, ask your provider specifically if they undergo annual third-party security audits. A “secure” claim is not a substitute for a verified audit report.

The Necessity of Third-Party Audits

A recurring theme in recent breaches is the absence of pre-launch security audits. When questioned, leadership at Practice by Numbers declined to confirm if their portal had undergone such a review. In an era of sophisticated cyber threats, relying on internal testing is no longer sufficient, especially for companies handling protected health information.

The Necessity of Third-Party Audits
Numbers The Rise

Frequently Asked Questions

What is an IDOR vulnerability?

An Insecure Direct Object Reference (IDOR) occurs when an application provides direct access to objects based on user-supplied input. If the system doesn’t verify that the user has permission to access that specific object, an attacker can simply change a value (like a patient ID in a URL) to view someone else’s data.

Why are companies slow to implement reporting channels?

Some companies fear that inviting reports will draw more attention to their flaws or lead to “beg-bounties” (people reporting trivial issues for money). However, the risk of a silent breach or a public exposé is far greater than the cost of managing a VDP.

How can I tell if my data has been exposed in a software bug?

The most reliable way is through official notifications from the service provider. In the recent dental software case, the company worked with the affected practice to notify the specific patients identified in their server logs.

What do you think? Should companies be legally required to provide a functional security reporting channel? Let us know in the comments below or subscribe to our newsletter for more insights on digital privacy.

You may also like

Leave a Comment