#VU24792 Improper access control in Medtronic products - CVE-2019-6538
Published: January 31, 2020
MyCareLink Monitor
CareLink Monitor
Amplia CRT-D
Claria CRT-D
Compia CRT-D
Concerto CRT-D
Concerto II CRT-D
Consulta CRT-D
Evera ICD
Maximo II CRT-D
Maximo II ICD
Mirro ICD
Nayamed ND ICD
Primo ICD
Protecta ICD
Protecta CRT-D
Secura ICD
Virtuoso ICD
Virtuoso II ICD
Visia AF ICD
Viva CRT-D
Brava CRT-D
Mirro MRI ICD
2090 CareLink Programmer
Medtronic
Description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the Conexus Radio Frequency Telemetry Protocol. A remote attacker on the local network, when the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.
Remediation
Vendor has developed mitigating patches for the following products:
- Brava CRT-D, all models
- Evera MRI ICD, all models
- Evera ICD, all models
- Mirro MRI ICD, all models
- Primo MRI ICD, all models
- Viva CRT-D, all models
These patches are installed during regular office visits.