Vulnerabilities > CVE-2019-6538 - Missing Authorization vulnerability in Medtronic products

047910
CVSS 6.5 - MEDIUM
Attack vector
ADJACENT_NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
HIGH
Availability impact
NONE
low complexity
medtronic
CWE-862

Summary

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.

Common Weakness Enumeration (CWE)

The Hacker News

idTHN:22BD1C3E7F7F5638B94295741D887160
last seen2019-03-22
modified2019-03-22
published2019-03-22
reporterThe Hacker News
sourcehttps://thehackernews.com/2019/03/hacking-implantable-defibrillators.html
titleMedtronic's Implantable Defibrillators Vulnerable to Life-Threatening Hacks