Vulnerabilites related to Medtronic - CareLink 2090 Programmer
CVE-2019-6538 (GCVE-0-2019-6538)
Vulnerability from cvelistv5
Published
2019-03-25 21:26
Modified
2025-05-22 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Medtronic | Conexus Radio Frequency Telemetry Protocol |
Version: All versions |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:21.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107544", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107544" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Conexus Radio Frequency Telemetry Protocol", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "MyCareLink Monitor", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "24950" }, { "status": "affected", "version": "24952" } ] }, { "defaultStatus": "unaffected", "product": "CareLink Monitor", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "2490C" } ] }, { "defaultStatus": "unaffected", "product": "CareLink 2090 Programmer", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Amplia CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Claria CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Compia CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Concerto CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Concerto II CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Consulta CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Evera ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Maximo II CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Maximo II ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Mirro ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Nayamed ND ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Primo ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Protecta ICD, Protecta CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Secura ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Virtuoso ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Virtuoso II ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Visia AF ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Viva CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Brava CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Mirro MRI ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Peter Morgan of Clever Security; Dave Singel\u00e9e and Bart Preneel of KU Leuven; Eduard Marin formerly of KU Leuven, currently with University of Birmingham; Flavio D. Garcia; Tom Chothia of the University of Birmingham; and Rik Willems of University Hospital Gasthuisberg Leuven reported these vulnerabilities to CISA." } ], "datePublic": "2019-03-21T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\nThe Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product\u2019s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.\n\n\u003c/p\u003e" } ], "value": "The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product\u2019s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-22T19:26:15.126Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01" }, { "name": "107544", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107544" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMedtronic has developed mitigating patches for a subset of the \naffected implanted cardiac device models. These patches are installed \nduring regular office visits. Medtronic has stated that patches for \nadditional impacted models are being developed by Medtronic and will be \ndeployed through future updates. Patches are currently available for the\n following affected models:\u003cbr\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eProtecta CRT-D and implantable cardioverter defibrillators (ICDs), all models\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003eAmplia MRI CRT-D, all models (patch available in U.S. only)\u003c/li\u003e\u003cli\u003eClaria MRI CRT-D, all models (patch available in U.S. only)\u003c/li\u003e\u003cli\u003eCompia MRI CRT-D, all models (patch available in U.S. only)\u003c/li\u003e\u003cli\u003eVisia AF MRI ICD, all models\u003c/li\u003e\u003cli\u003eVisia AF ICD, all models \u003c/li\u003e\u003cli\u003eBrava CRT-D, all models \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u003c/li\u003e\u003cli\u003eEvera MRI ICD, all models\u003c/li\u003e\u003cli\u003eEvera ICD, all models\u003c/li\u003e\u003cli\u003eMirro MRI ICD, all models\u003c/li\u003e\u003cli\u003ePrimo MRI ICD, all models\u003c/li\u003e\u003cli\u003eViva CRT-D, all models\u003c/li\u003e\u003c/ul\u003e\n\n\u003cbr\u003e" } ], "value": "Medtronic has developed mitigating patches for a subset of the \naffected implanted cardiac device models. These patches are installed \nduring regular office visits. Medtronic has stated that patches for \nadditional impacted models are being developed by Medtronic and will be \ndeployed through future updates. Patches are currently available for the\n following affected models:\n\n\n * Protecta CRT-D and implantable cardioverter defibrillators (ICDs), all models\n\n\n * Amplia MRI CRT-D, all models (patch available in U.S. only)\n * Claria MRI CRT-D, all models (patch available in U.S. only)\n * Compia MRI CRT-D, all models (patch available in U.S. only)\n * Visia AF MRI ICD, all models\n * Visia AF ICD, all models \n * Brava CRT-D, all models \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\n * Evera MRI ICD, all models\n * Evera ICD, all models\n * Mirro MRI ICD, all models\n * Primo MRI ICD, all models\n * Viva CRT-D, all models" } ], "source": { "advisory": "ICSMA-19-080-01", "discovery": "EXTERNAL" }, "title": "Medtronic Conexus Radio Frequency Telemetry Protocol Improper Access Control", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMedtronic has applied additional controls for monitoring and responding to improper use of the Conexus telemetry protocol by the affected implanted cardiac devices. Additional mitigations are being developed and will be deployed through future updates, assuming regulatory approval.\u003c/p\u003e\u003cp\u003eMedtronic recommends that users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMaintain good physical control over home monitors and programmers.\u003c/li\u003e\u003cli\u003eUse only home monitors, programmers, and implantable devices obtained directly from your healthcare provider or a Medtronic representative to ensure integrity of the system.\u003c/li\u003e\u003cli\u003eDo not connect unapproved devices to home monitors and programmers through USB ports or other physical connections.\u003c/li\u003e\u003cli\u003eOnly use programmers to connect and interact with implanted devices in physically controlled hospital and clinical environments.\u003c/li\u003e\u003cli\u003eOnly use home monitors in private environments such as a home, apartment, or otherwise physically controlled environment.\u003c/li\u003e\u003cli\u003eReport any concerning behavior regarding these products to your healthcare provider or a Medtronic representative.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eMedtronic has released additional \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.medtronic.com/security\"\u003epatient focused information\u003c/a\u003e.\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "Medtronic has applied additional controls for monitoring and responding to improper use of the Conexus telemetry protocol by the affected implanted cardiac devices. Additional mitigations are being developed and will be deployed through future updates, assuming regulatory approval.\n\nMedtronic recommends that users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:\n\n * Maintain good physical control over home monitors and programmers.\n * Use only home monitors, programmers, and implantable devices obtained directly from your healthcare provider or a Medtronic representative to ensure integrity of the system.\n * Do not connect unapproved devices to home monitors and programmers through USB ports or other physical connections.\n * Only use programmers to connect and interact with implanted devices in physically controlled hospital and clinical environments.\n * Only use home monitors in private environments such as a home, apartment, or otherwise physically controlled environment.\n * Report any concerning behavior regarding these products to your healthcare provider or a Medtronic representative.\n\n\nMedtronic has released additional patient focused information https://www.medtronic.com/security ." } ], "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-6540", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Conexus Radio Frequency Telemetry Protocol", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "MyCareLink Monitor", "version": { "version_data": [ { "version_value": "24950" }, { "version_value": "24952" } ] } }, { "product_name": "CareLink Monitor", "version": { "version_data": [ { "version_value": "2490C" } ] } }, { "product_name": "CareLink 2090 Programmer", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Amplia CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Claria CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Compia CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Concerto CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Concerto II CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Consulta CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Evera ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Maximo II CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Maximo II ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Mirro ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Nayamed ND ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Primo ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Protecta ICD, Protecta CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Secura ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Virtuoso ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Virtuoso II ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Visia AF ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Viva CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Medtronic" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement encryption. An attacker with adjacent short-range access to a target product can listen to communications, including the transmission of sensitive data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01" }, { "name": "107544", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107544" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-6538", "datePublished": "2019-03-25T21:26:03", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2025-05-22T19:26:15.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6540 (GCVE-0-2019-6540)
Vulnerability from cvelistv5
Published
2019-03-26 17:47
Modified
2025-05-22 19:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-319 - Cleartext Transmission of Sensitive Information
Summary
The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement encryption. An attacker with adjacent short-range access to a target product can listen to communications, including the transmission of sensitive data.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Medtronic | Conexus Radio Frequency Telemetry Protocol |
Version: All versions |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:21.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01" }, { "name": "107544", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107544" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Conexus Radio Frequency Telemetry Protocol", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "MyCareLink Monitor", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "24950" }, { "status": "affected", "version": "24952" } ] }, { "defaultStatus": "unaffected", "product": "CareLink Monitor", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "2490C" } ] }, { "defaultStatus": "unaffected", "product": "CareLink 2090 Programmer", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Amplia CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Claria CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Compia CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Concerto CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Concerto II CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Consulta CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Evera ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Maximo II CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Maximo II ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Mirro ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Nayamed ND ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Primo ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Protecta ICD, Protecta CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Secura ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Virtuoso ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Virtuoso II ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Visia AF ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Viva CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Brava CRT-D", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "Mirro MRI ICD", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Peter Morgan of Clever Security; Dave Singel\u00e9e and Bart Preneel of KU Leuven; Eduard Marin formerly of KU Leuven, currently with University of Birmingham; Flavio D. Garcia; Tom Chothia of the University of Birmingham; and Rik Willems of University Hospital Gasthuisberg Leuven reported these vulnerabilities to CISA." } ], "datePublic": "2019-03-21T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement encryption. An attacker with adjacent short-range access to a target product can listen to communications, including the transmission of sensitive data.\u003c/p\u003e" } ], "value": "The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement encryption. An attacker with adjacent short-range access to a target product can listen to communications, including the transmission of sensitive data." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319 Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-22T19:23:42.770Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01" }, { "name": "107544", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107544" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMedtronic has developed mitigating patches for a subset of the \naffected implanted cardiac device models. These patches are installed \nduring regular office visits. Medtronic has stated that patches for \nadditional impacted models are being developed by Medtronic and will be \ndeployed through future updates. Patches are currently available for the\n following affected models:\u003cbr\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eProtecta CRT-D and implantable cardioverter defibrillators (ICDs), all models\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003eAmplia MRI CRT-D, all models (patch available in U.S. only)\u003c/li\u003e\u003cli\u003eClaria MRI CRT-D, all models (patch available in U.S. only)\u003c/li\u003e\u003cli\u003eCompia MRI CRT-D, all models (patch available in U.S. only)\u003c/li\u003e\u003cli\u003eVisia AF MRI ICD, all models\u003c/li\u003e\u003cli\u003eVisia AF ICD, all models \u003c/li\u003e\u003cli\u003eBrava CRT-D, all models \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u003c/li\u003e\u003cli\u003eEvera MRI ICD, all models\u003c/li\u003e\u003cli\u003eEvera ICD, all models\u003c/li\u003e\u003cli\u003eMirro MRI ICD, all models\u003c/li\u003e\u003cli\u003ePrimo MRI ICD, all models\u003c/li\u003e\u003cli\u003eViva CRT-D, all models\u003c/li\u003e\u003c/ul\u003e\n\n\u003cbr\u003e" } ], "value": "Medtronic has developed mitigating patches for a subset of the \naffected implanted cardiac device models. These patches are installed \nduring regular office visits. Medtronic has stated that patches for \nadditional impacted models are being developed by Medtronic and will be \ndeployed through future updates. Patches are currently available for the\n following affected models:\n\n\n * Protecta CRT-D and implantable cardioverter defibrillators (ICDs), all models\n\n\n * Amplia MRI CRT-D, all models (patch available in U.S. only)\n * Claria MRI CRT-D, all models (patch available in U.S. only)\n * Compia MRI CRT-D, all models (patch available in U.S. only)\n * Visia AF MRI ICD, all models\n * Visia AF ICD, all models \n * Brava CRT-D, all models \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\n * Evera MRI ICD, all models\n * Evera ICD, all models\n * Mirro MRI ICD, all models\n * Primo MRI ICD, all models\n * Viva CRT-D, all models" } ], "source": { "advisory": "ICSMA-19-080-01", "discovery": "EXTERNAL" }, "title": "Medtronic Conexus Radio Frequency Telemetry Protocol Cleartext Transmission of Sensitive Information", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMedtronic has applied additional controls for monitoring and responding to improper use of the Conexus telemetry protocol by the affected implanted cardiac devices. Additional mitigations are being developed and will be deployed through future updates, assuming regulatory approval.\u003c/p\u003e\u003cp\u003eMedtronic recommends that users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMaintain good physical control over home monitors and programmers.\u003c/li\u003e\u003cli\u003eUse only home monitors, programmers, and implantable devices obtained directly from your healthcare provider or a Medtronic representative to ensure integrity of the system.\u003c/li\u003e\u003cli\u003eDo not connect unapproved devices to home monitors and programmers through USB ports or other physical connections.\u003c/li\u003e\u003cli\u003eOnly use programmers to connect and interact with implanted devices in physically controlled hospital and clinical environments.\u003c/li\u003e\u003cli\u003eOnly use home monitors in private environments such as a home, apartment, or otherwise physically controlled environment.\u003c/li\u003e\u003cli\u003eReport any concerning behavior regarding these products to your healthcare provider or a Medtronic representative.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eMedtronic has released additional \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.medtronic.com/security\"\u003epatient focused information\u003c/a\u003e.\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "Medtronic has applied additional controls for monitoring and responding to improper use of the Conexus telemetry protocol by the affected implanted cardiac devices. Additional mitigations are being developed and will be deployed through future updates, assuming regulatory approval.\n\nMedtronic recommends that users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:\n\n * Maintain good physical control over home monitors and programmers.\n * Use only home monitors, programmers, and implantable devices obtained directly from your healthcare provider or a Medtronic representative to ensure integrity of the system.\n * Do not connect unapproved devices to home monitors and programmers through USB ports or other physical connections.\n * Only use programmers to connect and interact with implanted devices in physically controlled hospital and clinical environments.\n * Only use home monitors in private environments such as a home, apartment, or otherwise physically controlled environment.\n * Report any concerning behavior regarding these products to your healthcare provider or a Medtronic representative.\n\n\nMedtronic has released additional patient focused information https://www.medtronic.com/security ." } ], "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-6540", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Conexus Radio Frequency Telemetry Protocol", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "MyCareLink Monitor", "version": { "version_data": [ { "version_value": "24950" }, { "version_value": "24952" } ] } }, { "product_name": "CareLink Monitor", "version": { "version_data": [ { "version_value": "2490C" } ] } }, { "product_name": "CareLink 2090 Programmer", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Amplia CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Claria CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Compia CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Concerto CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Concerto II CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Consulta CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Evera ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Maximo II CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Maximo II ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Mirro ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Nayamed ND ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Primo ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Protecta ICD, Protecta CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Secura ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Virtuoso ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Virtuoso II ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Visia AF ICD", "version": { "version_data": [ { "version_value": "n/a" } ] } }, { "product_name": "Viva CRT-D", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Medtronic" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement encryption. An attacker with adjacent short-range access to a target product can listen to communications, including the transmission of sensitive data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information CWE-319" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01" }, { "name": "107544", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107544" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-6540", "datePublished": "2019-03-26T17:47:23", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2025-05-22T19:23:42.770Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-18984 (GCVE-0-2018-18984)
Vulnerability from cvelistv5
Published
2018-12-14 15:00
Modified
2025-05-22 16:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-311 - Missing Encryption of Sensitive Data
Summary
Medtronic CareLink and Encore Programmers
do not encrypt or do not sufficiently encrypt sensitive
PII and PHI information while at rest .
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Medtronic | CareLink 9790 Programmer |
Version: All versions |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:23:08.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106215", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106215" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-347-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CareLink 9790 Programmer", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "CareLink 2090 Programmer", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "29901 Encore Programmer", "vendor": "Medtronic", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Researchers Billy Rios and Jonathan Butts of Whitescope LLC reported this vulnerability" } ], "datePublic": "2018-12-14T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMedtronic CareLink and Encore Programmers\u003c/span\u003e\n\n do not encrypt or do not sufficiently encrypt sensitive \nPII and PHI information while at rest .\u003c/p\u003e" } ], "value": "Medtronic CareLink and Encore Programmers\n\n do not encrypt or do not sufficiently encrypt sensitive \nPII and PHI information while at rest ." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-311", "description": "CWE-311 Missing Encryption of Sensitive Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-22T16:40:53.366Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "106215", "url": "https://global.medtronic.com/xg-en/product-security/security-bulletins/carelink-9790-2090-29901.html" }, { "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-347-01" }, { "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/106215" } ], "source": { "advisory": "ICSMA-18-347-01", "discovery": "EXTERNAL" }, "title": "Medtronic 9790, 2090 CareLink, and 29901 Encore Programmers Missing Encryption of Sensitive Data", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe CareLink 9790 Programmer has been placed into end-of-life status and is no longer supported by Medtronic. Medtronic recommends users no longer use the 9790 for any purpose.\u003c/p\u003e\u003cp\u003eThe CareLink 2090 and 29901 Encore programmers store PHI and PII as part of their normal operating procedure. Medtronic recommends that when devices are storing PHI/PII it should be retained on these programmers for the least amount of time necessary, and should be handled, managed and secured in a manner consistent with the applicable laws for patient data privacy. Please contact a Medtronic representative for proper disposal and PHI/PII retention setting instructions.\u003c/p\u003e\u003cp\u003eAll affected programmers allow for the manual deletion of programmer-generated reports, which could contain PHI/PII. Medtronic recommends users delete these reports when no longer needed and prior to any disposition of the programmer.\u003c/p\u003e\u003cp\u003eMedtronic recommends users take additional defensive measures to minimize the risk of exploitation. Specifically, hospitals and clinicians should:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMaintain strict physical control of the programmer.\u003c/li\u003e\u003cli\u003eUse only legitimately obtained programmers and not ones provided by any third party.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eProper disposal of these programmers and the associated electronic media storing data is critical for the continued protection of any PHI and PII residing on the programmer.\u003c/p\u003e\u003cp\u003eMedtronic has released a security bulletin related to this advisory that is available, with contact information, at the following location:\u003c/p\u003e\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.medtronic.com/security\"\u003ehttps://www.medtronic.com/security\u003c/a\u003e\u003c/p\u003e" } ], "value": "The CareLink 9790 Programmer has been placed into end-of-life status and is no longer supported by Medtronic. Medtronic recommends users no longer use the 9790 for any purpose.\n\nThe CareLink 2090 and 29901 Encore programmers store PHI and PII as part of their normal operating procedure. Medtronic recommends that when devices are storing PHI/PII it should be retained on these programmers for the least amount of time necessary, and should be handled, managed and secured in a manner consistent with the applicable laws for patient data privacy. Please contact a Medtronic representative for proper disposal and PHI/PII retention setting instructions.\n\nAll affected programmers allow for the manual deletion of programmer-generated reports, which could contain PHI/PII. Medtronic recommends users delete these reports when no longer needed and prior to any disposition of the programmer.\n\nMedtronic recommends users take additional defensive measures to minimize the risk of exploitation. Specifically, hospitals and clinicians should:\n\n * Maintain strict physical control of the programmer.\n * Use only legitimately obtained programmers and not ones provided by any third party.\n\n\nProper disposal of these programmers and the associated electronic media storing data is critical for the continued protection of any PHI and PII residing on the programmer.\n\nMedtronic has released a security bulletin related to this advisory that is available, with contact information, at the following location:\n\n https://www.medtronic.com/security" } ], "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-18984", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Medtronic CareLink 2090 Programmer CareLink 9790 Programmer 29901 Encore Programmer", "version": { "version_data": [ { "version_value": "All versions" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Medtronic CareLink 2090 Programmer CareLink 9790 Programmer 29901 Encore Programmer, all versions, The affected products do not encrypt or do not sufficiently encrypt the following sensitive information while at rest PII and PHI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "MISSING ENCRPTION OF SENSITIVE DATA CWE-311" } ] } ] }, "references": { "reference_data": [ { "name": "106215", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106215" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-347-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-347-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-18984", "datePublished": "2018-12-14T15:00:00", "dateReserved": "2018-11-06T00:00:00", "dateUpdated": "2025-05-22T16:40:53.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }