Medtronic will release several over-the-air product updates to mitigate a use of hard-coded password and an exposed dangerous method or function vulnerabilities in its MyCareLink Patient Monitor, according to a report with NCCIC.
If exploited, these vulnerabilities, discovered by Peter Morgan of Clever Security, may allow privileged access to the monitor’s operating system. However, physical access to the MyCareLink monitor is required. Additionally, these vulnerabilities may allow a MyCareLink monitor, when operated within close physical proximity of an implantable cardiac device, to read and write arbitrary memory values of that device.
The following MyCareLink Monitors suffer from the issues:
• 24950 MyCareLink Monitor, all versions
• 24952 MyCareLink Monitor, all versions
In one vulnerability, the affected product contains a hard-coded operating system password. An attacker with physical access can remove the case of the device, connect to the debug port, and use the password to gain privileged access to the operating system
CVE-2018-8870 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.4.
In addition, the affected product contains debug code meant to test the functionality of the monitor’s communication interfaces, including the interface between the monitor and implantable cardiac device. An attacker with physical access to the device can apply the other vulnerabilities within this advisory to access this debug functionality.
This debug functionality provides the ability to read and write arbitrary memory values to implantable cardiac devices via inductive or short range wireless protocols. An attacker with close physical proximity to a target implantable cardiac device can use this debug functionality.
CVE-2018-8868 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.2.
The product sees use mainly in the healthcare and public health sectors. It also sees action on a global basis.
No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely. High skill level is needed to exploit.
Dublin, Ireland-based Medtronic will release several rolling over-the-air product updates that will mitigate the vulnerabilities described within this advisory. These updates will be applied to devices automatically as part of standard, reoccurring update processes. In addition, Medtronic increased security monitoring of affected devices and related infrastructure.
Medtronic recommends users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
• Maintain good physical controls over the home monitor as the best mitigation to these vulnerabilities.
• Only use home monitors obtained directly from their healthcare provider or a Medtronic representative to ensure integrity of the system.
• Report any concerning behavior regarding their home monitor to their healthcare provider or a Medtronic representative.
Click here for additional Medtronic patient focused information.