CVE-2019-6538

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the products radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.3 CRITICAL
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
icscertCNA
9.3 CRITICAL
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 50%
VendorProductVersion
medtroniccarelink_2090_firmware
-
medtronicamplia_crt-d_firmware
-
medtronicclaria_crt-d_firmware
-
medtroniccompia_crt-d_firmware
-
medtronicconcerto_crt-d_firmware
-
medtronicconcerto_ii_crt-d_firmware
-
medtronicconsulta_crt-d_firmware
-
medtronicevera_icd_firmware
-
medtronicmaximo_ii_crt-d_and_lcd_firmware
-
medtronicmirro_icd_firmware
-
medtronicnayamed_nd_icd_firmware
-
medtronicprimo_icd_firmware
-
medtronicprotecta_icd_and_crt-d_firmware
-
medtronicsecura_icd_firmware
-
medtronicvirtuoso_icd_firmware
-
medtronicvirtuoso_ii_icd_firmware
-
medtronicvisia_af_icd_firmware
-
medtronicviva_crt-d_firmware
-
𝑥
= Vulnerable software versions