#VU49521 Authentication Bypass by Spoofing


Published: 2021-01-14

Vulnerability identifier: #VU49521

Vulnerability risk: Low

CVSSv3.1: 5 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-27276

CWE-ID: CWE-290

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Dana Diabecare RS
Hardware solutions / Medical equipment
AnyDana-i
Hardware solutions / Medical equipment
AnyDana-A
Hardware solutions / Medical equipment

Vendor: SOOIL Developments Co., Ltd

Description

The vulnerability allows a remote attacker to perform a spoofing attack.

The vulnerability exists due to the communication protocol of the insulin pump and its mobile applications does not use adequate measures to authenticate the communicating entities before exchanging keys. A remote attacker on the local network can eavesdrop the authentication sequence via Bluetooth Low Energy.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Dana Diabecare RS: All versions

AnyDana-i: All versions

AnyDana-A: All versions


External links
http://ics-cert.us-cert.gov/advisories/icsma-21-012-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability