{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-6538", "ASSIGNER": "ics-cert@hq.dhs.gov", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Medtronic", "product": { "product_data": [ { "product_name": "Medtronic Conexus Radio Frequency Telemetry Protocol", "version": { "version_data": [ { "version_value": "MyCareLink Monitor versions 24950 and 24952" }, { "version_value": "CareLink Monitor version 2490C" }, { "version_value": "CareLink 2090 Programmer" }, { "version_value": "Amplia CRT-D" }, { "version_value": "Claria CRT-D" }, { "version_value": "Compia CRT-D" }, { "version_value": "Concerto CRT-D" }, { "version_value": "Concerto II CRT-D" }, { "version_value": "Consulta CRT-D" }, { "version_value": "Evera ICD" }, { "version_value": "Maximo II CRT-D and ICD" }, { "version_value": "Mirro ICD" }, { "version_value": "Nayamed ND ICD" }, { "version_value": "Primo ICD" }, { "version_value": "Protecta ICD and CRT-D" }, { "version_value": "Secura ICD" }, { "version_value": "Virtuoso ICD" }, { "version_value": "Virtuoso II ICD" }, { "version_value": "Visia AF ICD" }, { "version_value": "Viva CRT-D" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control CWE-284" } ] } ] }, "references": { "reference_data": [ { "refsource": "BID", "name": "107544", "url": "http://www.securityfocus.com/bid/107544" }, { "refsource": "CONFIRM", "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01", "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product\u2019s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device." } ] } }