CVE-2019-6538

Severity CVSS v4.0:
Pending analysis
Type:
CWE-284 Improper Access Control
Publication date:
25/03/2019
Last modified:
22/05/2025

Description

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:medtronic:mycarelink_monitor_firmware:24950:*:*:*:*:*:*:*
cpe:2.3:o:medtronic:mycarelink_monitor_firmware:24952:*:*:*:*:*:*:*
cpe:2.3:h:medtronic:mycarelink_monitor:-:*:*:*:*:*:*:*
cpe:2.3:o:medtronic:carelink_monitor_firmware:2490c:*:*:*:*:*:*:*
cpe:2.3:h:medtronic:carelink_monitor:-:*:*:*:*:*:*:*
cpe:2.3:o:medtronic:carelink_2090_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:medtronic:carelink_2090:-:*:*:*:*:*:*:*
cpe:2.3:o:medtronic:amplia_crt-d_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:medtronic:amplia_crt-d:-:*:*:*:*:*:*:*
cpe:2.3:o:medtronic:claria_crt-d_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:medtronic:claria_crt-d:-:*:*:*:*:*:*:*
cpe:2.3:o:medtronic:compia_crt-d_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:medtronic:compia_crt-d:-:*:*:*:*:*:*:*
cpe:2.3:o:medtronic:concerto_crt-d_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:medtronic:concerto_crt-d:-:*:*:*:*:*:*:*