SB2019032520 - Multiple vulnerabilities in several Medtronic products



SB2019032520 - Multiple vulnerabilities in several Medtronic products

Published: March 25, 2019 Updated: January 31, 2020

Security Bulletin ID SB2019032520
Severity
Low
Patch available
NO
Number of vulnerabilities 2
Exploitation vector Adjecent network
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Cleartext transmission of sensitive information (CVE-ID: CVE-2019-6540)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to the Conexus telemetry protocol uses insecure communication channel to transmit sensitive information. A remote attacker on the local network with ability to intercept network traffic can gain access to sensitive data.


2) Improper access control (CVE-ID: CVE-2019-6538)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the Conexus Radio Frequency Telemetry Protocol. A remote attacker on the local network, when the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.