Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cv4q-4xgp-cr7m

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolus" options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.

Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolus" options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.

EPSS

Процентиль: 55%
0.00321
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-287
CWE-294

Связанные уязвимости

CVSS3: 5.3
nvd
больше 7 лет назад

Medtronic MiniMed MMT devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.

CVSS3: 6.5
fstec
больше 7 лет назад

Уязвимость медицинского оборудования Medtronic MiniMed, вызванная недостатками механизма аутентификации, позволяющая нарушителю повторно воспроизвести перехваченный запрос

EPSS

Процентиль: 55%
0.00321
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-287
CWE-294