CVE-2019-6538

moderate-risk
Published 2019-03-25

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.

Do I need to act?

-
0.22% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.3/10 Critical
ADJACENT_NETWORK / LOW complexity

Affected Products (20)

Mycarelink Monitor Firmware
Mycarelink Monitor Firmware
Carelink Monitor Firmware
Carelink 2090 Firmware
Amplia Crt-D Firmware
Claria Crt-D Firmware
Compia Crt-D Firmware
Concerto Crt-D Firmware
Concerto Ii Crt-D Firmware
Consulta Crt-D Firmware
Evera Icd Firmware
Maximo Ii Crt-D And Lcd Firmware
Mirro Icd Firmware
Nayamed Nd Icd Firmware
Primo Icd Firmware
Protecta Icd And Crt-D Firmware
Secura Icd Firmware
Virtuoso Icd Firmware
Virtuoso Ii Icd Firmware
Visia Af Icd Firmware

Affected Vendors

49
/ 100
moderate-risk
Severity 28/34 · Critical
Exploitability 1/34 · Minimal
Exposure 20/34 · Moderate