Project Subscriptions
| Vendors | Products |
|---|---|
|
Medtronic
Subscribe
|
Amplia Crt-d
Subscribe
Amplia Crt-d Firmware
Subscribe
Carelink 2090
Subscribe
Carelink 2090 Firmware
Subscribe
Carelink Monitor
Subscribe
Carelink Monitor Firmware
Subscribe
Claria Crt-d
Subscribe
Claria Crt-d Firmware
Subscribe
Compia Crt-d
Subscribe
Compia Crt-d Firmware
Subscribe
Concerto Crt-d
Subscribe
Concerto Crt-d Firmware
Subscribe
Concerto Ii Crt-d
Subscribe
Concerto Ii Crt-d Firmware
Subscribe
Consulta Crt-d
Subscribe
Consulta Crt-d Firmware
Subscribe
Evera Icd
Subscribe
Evera Icd Firmware
Subscribe
Maximo Ii Crt-d And Lcd
Subscribe
Maximo Ii Crt-d And Lcd Firmware
Subscribe
Mirro Icd
Subscribe
Mirro Icd Firmware
Subscribe
Mycarelink Monitor
Subscribe
Mycarelink Monitor Firmware
Subscribe
Nayamed Nd Icd
Subscribe
Nayamed Nd Icd Firmware
Subscribe
Primo Icd
Subscribe
Primo Icd Firmware
Subscribe
Protecta Icd And Crt-d
Subscribe
Protecta Icd And Crt-d Firmware
Subscribe
Secura Icd
Subscribe
Secura Icd Firmware
Subscribe
Virtuoso Icd
Subscribe
Virtuoso Icd Firmware
Subscribe
Virtuoso Ii Icd
Subscribe
Virtuoso Ii Icd Firmware
Subscribe
Visia Af Icd
Subscribe
Visia Af Icd Firmware
Subscribe
Viva Crt-d
Subscribe
Viva Crt-d Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-16097 | The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device. |
Solution
Medtronic has developed mitigating patches for a subset of the affected implanted cardiac device models. These patches are installed during regular office visits. Medtronic has stated that patches for additional impacted models are being developed by Medtronic and will be deployed through future updates. Patches are currently available for the following affected models: * Protecta CRT-D and implantable cardioverter defibrillators (ICDs), all models * Amplia MRI CRT-D, all models (patch available in U.S. only) * Claria MRI CRT-D, all models (patch available in U.S. only) * Compia MRI CRT-D, all models (patch available in U.S. only) * Visia AF MRI ICD, all models * Visia AF ICD, all models * Brava CRT-D, all models * Evera MRI ICD, all models * Evera ICD, all models * Mirro MRI ICD, all models * Primo MRI ICD, all models * Viva CRT-D, all models
Workaround
Medtronic has applied additional controls for monitoring and responding to improper use of the Conexus telemetry protocol by the affected implanted cardiac devices. Additional mitigations are being developed and will be deployed through future updates, assuming regulatory approval. Medtronic recommends that users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: * Maintain good physical control over home monitors and programmers. * Use only home monitors, programmers, and implantable devices obtained directly from your healthcare provider or a Medtronic representative to ensure integrity of the system. * Do not connect unapproved devices to home monitors and programmers through USB ports or other physical connections. * Only use programmers to connect and interact with implanted devices in physically controlled hospital and clinical environments. * Only use home monitors in private environments such as a home, apartment, or otherwise physically controlled environment. * Report any concerning behavior regarding these products to your healthcare provider or a Medtronic representative. Medtronic has released additional patient focused information https://www.medtronic.com/security .
Thu, 22 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Medtronic Conexus Radio Frequency Telemetry Protocol Improper Access Control | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-22T19:26:15.126Z
Reserved: 2019-01-22T00:00:00
Link: CVE-2019-6538
No data.
Status : Modified
Published: 2019-03-25T22:29:00.763
Modified: 2025-05-22T20:15:20.660
Link: CVE-2019-6538
No data.
OpenCVE Enrichment
No data.
EUVD