{ "CVE_data_meta" : { "ASSIGNER" : "ics-cert@hq.dhs.gov", "DATE_PUBLIC" : "2018-08-08T00:00:00", "ID" : "CVE-2018-14781", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Medtronic insulin pump", "version" : { "version_data" : [ { "version_value" : "MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G" } ] } } ] }, "vendor_name" : "ICS-CERT" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the \"easy bolus\" and \"remote bolus\" options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-219-02", "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-219-02" }, { "name" : "105044", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/105044" } ] } }