Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-32537 |
CWE-ID | CWE-693 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
MiniMed 620G Hardware solutions / Medical equipment MiniMed 630G Hardware solutions / Medical equipment MiniMed 640G Hardware solutions / Medical equipment MiniMed 670G Hardware solutions / Medical equipment |
Vendor | Medtronic |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU67535
Risk: Medium
CVSSv4.0: 2.1 [CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-32537
CWE-ID:
CWE-693 - Protection Mechanism Failure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures. A remote user on the local network can learn aspects of the communication protocol used to pair system components while the pump is being paired with other system components.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsMiniMed 620G: MMT-1710
MiniMed 630G: MMT-1715 - MMT-1755
MiniMed 640G: MMT-1711 - MMT-1752
MiniMed 670G: MMT-1740 - MMT-1782
CPE2.3http://ics-cert.us-cert.gov/advisories/icsma-22-263-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.