Vulnerability Details : CVE-2019-6538
The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.
Vulnerability category: BypassGain privilege
Products affected by CVE-2019-6538
- cpe:2.3:o:medtronic:mycarelink_monitor_firmware:24952:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:mycarelink_monitor_firmware:24950:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:carelink_monitor_firmware:2490c:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:carelink_2090_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:amplia_crt-d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:claria_crt-d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:compia_crt-d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:concerto_crt-d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:concerto_ii_crt-d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:consulta_crt-d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:evera_icd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:maximo_ii_crt-d_and_lcd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:mirro_icd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:nayamed_nd_icd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:primo_icd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:protecta_icd_and_crt-d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:secura_icd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:virtuoso_icd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:virtuoso_ii_icd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:visia_af_icd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:medtronic:viva_crt-d_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-6538
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-6538
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:A/AC:L/Au:N/C:N/I:P/A:N |
6.5
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2019-6538
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: ics-cert@hq.dhs.gov (Secondary)
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
-
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-6538
-
https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01
Medtronic Conexus Radio Frequency Telemetry Protocol | CISAMitigation;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/107544
Medtronic Conexus Radio Frequency Telemetry Protocol Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
Jump to