CVE-2019-6538
25.03.2019, 22:29
The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the products radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.Enginsight
Vendor | Product | Version |
---|---|---|
medtronic | carelink_2090_firmware | - |
medtronic | amplia_crt-d_firmware | - |
medtronic | claria_crt-d_firmware | - |
medtronic | compia_crt-d_firmware | - |
medtronic | concerto_crt-d_firmware | - |
medtronic | concerto_ii_crt-d_firmware | - |
medtronic | consulta_crt-d_firmware | - |
medtronic | evera_icd_firmware | - |
medtronic | maximo_ii_crt-d_and_lcd_firmware | - |
medtronic | mirro_icd_firmware | - |
medtronic | nayamed_nd_icd_firmware | - |
medtronic | primo_icd_firmware | - |
medtronic | protecta_icd_and_crt-d_firmware | - |
medtronic | secura_icd_firmware | - |
medtronic | virtuoso_icd_firmware | - |
medtronic | virtuoso_ii_icd_firmware | - |
medtronic | visia_af_icd_firmware | - |
medtronic | viva_crt-d_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-284 - Improper Access ControlThe software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- CWE-306 - Missing Authentication for Critical FunctionThe product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.