CVE-2019-10964 (GCVE-0-2019-10964)

Vulnerability from cvelistv5 – Published: 2019-06-28 20:58 – Updated: 2025-05-22 18:29
VLAI?
Summary
Medtronic MiniMed Insulin Pumps are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.
CWE
Assigner
Credits
Based on earlier work performed by external researchers including Nathanael Paul, Jay Radcliffe, and Barnaby Jack, and from recent work performed by external researchers Billy Rios, Jonathan Butts, and Jesse Young, Medtronic performed additional variant analysis and reported this vulnerability
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:40:15.617Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsma-19-178-01"
          },
          {
            "name": "108926",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108926"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed 508 pump",
          "vendor": "Medtronic",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm 511 pump",
          "vendor": "Medtronic",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm 512/712 pumps",
          "vendor": "Medtronic",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm 712E pump",
          "vendor": "Medtronic",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm 515/715 pumps",
          "vendor": "Medtronic",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm 522/722 pumps",
          "vendor": "Medtronic",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm 522K/722K pumps",
          "vendor": "Medtronic",
          "versions": [
            {
              "status": "affected",
              "version": "All versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm 523/723 pumps",
          "vendor": "Medtronic",
          "versions": [
            {
              "lessThanOrEqual": "Software Versions 2.4A",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm 523K/723K pumps",
          "vendor": "Medtronic",
          "versions": [
            {
              "lessThanOrEqual": "Software Versions 2.4A",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm Veo 554/754 pumps",
          "vendor": "Medtronic",
          "versions": [
            {
              "lessThanOrEqual": "Software Versions 2.6A",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "MiniMed Paradigm Veo 554CM/754CM pumps",
          "vendor": "Medtronic",
          "versions": [
            {
              "lessThanOrEqual": "Software Versions 2.7A",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Based on earlier work performed by external researchers including Nathanael Paul, Jay Radcliffe, and Barnaby Jack, and from recent work performed by external researchers Billy Rios, Jonathan Butts, and Jesse Young, Medtronic performed additional variant analysis and reported this vulnerability"
        }
      ],
      "datePublic": "2019-06-27T06:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eMedtronic MiniMed Insulin Pumps\u003c/span\u003e\n\n are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.\u003c/p\u003e"
            }
          ],
          "value": "Medtronic MiniMed Insulin Pumps\n\n are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-22T18:29:15.376Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://global.medtronic.com/xg-en/product-security/security-bulletins/minimed-508-paradigm.html"
        },
        {
          "name": "108926",
          "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-19-178-01"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "http://www.securityfocus.com/bid/108926"
        }
      ],
      "source": {
        "advisory": "ICSMA-19-178-01",
        "discovery": "INTERNAL"
      },
      "title": "Medtronic MiniMed 508 and Paradigm Series Insulin Pumps Improper Access Control",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eMedtronic recommends U.S. patients who are currently using the affected products talk to their healthcare provider about changing to a newer model insulin pump with increased cybersecurity protection. Patients outside the U.S. will receive a notification letter with instructions based on the country where they live.\u003c/p\u003e\u003cp\u003eMedtronic recommends all patients take the cybersecurity precautions indicated below.\u003c/p\u003e\u003cp\u003eCYBERSECURITY PRECAUTIONS RECOMMENDED FOR ALL PATIENTS:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMaintain tight physical control of the pump and devices connected to the pump\u003c/li\u003e\u003cli\u003eDo not share pump serial number\u003c/li\u003e\u003cli\u003eBe attentive to pump notifications, alarms, and alerts\u003c/li\u003e\u003cli\u003eImmediately cancel any unintended boluses (a single dose of insulin administered all at once)\u003c/li\u003e\u003cli\u003eDo not connect to any third-party devices or use any software not authorized by Medtronic\u003c/li\u003e\u003cli\u003eDisconnect CareLink USB devices from computers when not being used to download data from the pump\u003c/li\u003e\u003cli\u003eMonitor blood glucose levels closely and act as appropriate\u003c/li\u003e\u003cli\u003eGet medical help immediately when experiencing symptoms of severe hypoglycemia or diabetic ketoacidosis, or suspect an insulin pump settings, or insulin delivery have changed unexpectedly\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eMedtronic has released additional patient-focused information, at the following location:\u003c/p\u003e\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.medtronic.com/security\"\u003ehttps://www.medtronic.com/security\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "Medtronic recommends U.S. patients who are currently using the affected products talk to their healthcare provider about changing to a newer model insulin pump with increased cybersecurity protection. Patients outside the U.S. will receive a notification letter with instructions based on the country where they live.\n\nMedtronic recommends all patients take the cybersecurity precautions indicated below.\n\nCYBERSECURITY PRECAUTIONS RECOMMENDED FOR ALL PATIENTS:\n\n  *  Maintain tight physical control of the pump and devices connected to the pump\n  *  Do not share pump serial number\n  *  Be attentive to pump notifications, alarms, and alerts\n  *  Immediately cancel any unintended boluses (a single dose of insulin administered all at once)\n  *  Do not connect to any third-party devices or use any software not authorized by Medtronic\n  *  Disconnect CareLink USB devices from computers when not being used to download data from the pump\n  *  Monitor blood glucose levels closely and act as appropriate\n  *  Get medical help immediately when experiencing symptoms of severe hypoglycemia or diabetic ketoacidosis, or suspect an insulin pump settings, or insulin delivery have changed unexpectedly\n\n\nMedtronic has released additional patient-focused information, at the following location:\n\n https://www.medtronic.com/security"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2019-10964",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Medtronic MiniMed 508 and Paradigm Series Insulin Pumps",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "MiniMed 508 pump All versions"
                          },
                          {
                            "version_value": "MiniMed Paradigm 511 pump All versions"
                          },
                          {
                            "version_value": "MiniMed Paradigm 512/712 pump All versions"
                          },
                          {
                            "version_value": "MiniMed Paradigm 712E pump All versions"
                          },
                          {
                            "version_value": "MiniMed Paradigm 515/715 pumps\u2013All versions"
                          },
                          {
                            "version_value": "MiniMed Paradigm 522/722 pump\u2013All versions"
                          },
                          {
                            "version_value": "MiniMed Paradigm 522K/722K pumps\u2013All versions"
                          },
                          {
                            "version_value": "MiniMed Paradigm 523/723 pumps\u2013Software versions 2.4A or lower"
                          },
                          {
                            "version_value": "MiniMed Paradigm 523K/723K pumps versions 2.4A or lower"
                          },
                          {
                            "version_value": "MiniMed Paradigm Veo 554/754 pumps\u2013versions 2.6A or lower"
                          },
                          {
                            "version_value": "MiniMed Paradigm Veo 554CM and 754CM versions 2.7A or lower"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Medtronic"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Medtronic MinMed 508 and Medtronic Minimed Paradigm Insulin Pumps, Versions, MiniMed 508 pump \u2013 All versions, MiniMed Paradigm 511 pump \u2013 All versions, MiniMed Paradigm 512/712 pumps \u2013 All versions, MiniMed Paradigm 712E pump\u2013All versions, MiniMed Paradigm 515/715 pumps\u2013All versions, MiniMed Paradigm 522/722 pumps \u2013 All versions,MiniMed Paradigm 522K/722K pumps \u2013 All versions, MiniMed Paradigm 523/723 pumps \u2013 Software versions 2.4A or lower, MiniMed Paradigm 523K/723K pumps \u2013 Software, versions 2.4A or lower, MiniMed Paradigm Veo 554/754 pumps \u2013 Software versions 2.6A or lower, MiniMed Paradigm Veo 554CM and 754CM models only \u2013 Software versions 2.7A or lower, the affected insulin pumps are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Other"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsma-19-178-01",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsma-19-178-01"
            },
            {
              "name": "108926",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108926"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2019-10964",
    "datePublished": "2019-06-28T20:58:07",
    "dateReserved": "2019-04-08T00:00:00",
    "dateUpdated": "2025-05-22T18:29:15.376Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_508_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DDE99AD-6C56-4366-97A8-E7350AA1EBB6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_508:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6E4916C-6DD1-4404-BD7B-B998569EDF14\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_511_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E05835DE-DBD1-4FB9-B0C7-15785EE9026B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_511:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A13FBA6-5CCF-4E73-B6C9-6E3F7F962D43\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_512_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65BE1432-6334-424A-B9A5-B5A14AC4F45B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_512:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9AD611A-CC28-4F92-B2B9-8401658FD713\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_712_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7247AD5D-C2DA-4A72-B719-2064571A536F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_712:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D67EC51-006F-4BC9-85BB-A1A7D597C1C9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_712e_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"690D2311-70A2-44CD-899E-20FD3AD1AC8F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_712e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C13A6A49-96C7-475A-B04E-FCE7D39CDE4B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_515_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8A1BA82-91A6-48AF-AC01-10FD19D92462\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_515:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55151631-78E7-42C3-BB25-AC69D36FD369\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_715_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A63ED6AA-EB20-4C68-A52D-BA8D548DEA8D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_715:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B626EAD3-2781-4DFD-9720-0399E197C383\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_522_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8D6EB99-08D8-493E-BBCB-D7C3913CF4D0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_522:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2EBD943-6BE9-4438-BAFD-32CA3165F635\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_722_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAC192CC-0FD2-48E4-B19C-91C65DC4795B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_722:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9AD1FE7-B872-4E38-AAE9-E33BB5C4C665\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_522k_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D825C865-732D-4EBD-8452-6F1DA56D46CC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_522k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D653E95-9FAE-403D-990F-669E6455571B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_722k_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53AE31AD-579C-4EE9-A6C8-3B790521DAC7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_722k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A42FD945-6BE8-4264-B90A-57CAA76AF8E2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_523_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.4a\", \"matchCriteriaId\": \"66A65D8E-2091-414D-B251-9144A0C57404\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_523:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24A1C8C6-D38F-4CDB-95A8-2A64F559E678\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_723_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.4a\", \"matchCriteriaId\": \"7238B959-5ADF-404E-8281-299762763597\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_723:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4604A5B1-9FB9-4CD8-8691-688C86C446F4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_523k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.4a\", \"matchCriteriaId\": \"053F180C-A81C-410C-97D9-90E1ABF8A3CD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_523k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6519D44-D492-4CE8-88D9-0E0C6F716AF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_723k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.4a\", \"matchCriteriaId\": \"3C4B5EFD-DC90-4F88-97D4-9B7919777F4A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_723k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"858EFED7-6FEE-45C5-90F9-6A7D381992D1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_veo_554_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.6a\", \"matchCriteriaId\": \"6831F875-8251-4FE2-AF83-627B7D55D1A4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_veo_554:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"655937A8-0CD6-4BE1-A8C4-0D6CEB9E67CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_veo_754_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.6a\", \"matchCriteriaId\": \"FE0CD31A-D8EC-4B3A-ADD6-B40B6F005D4B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_veo_754:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026D0A22-334A-4B90-BA5E-182836258043\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_veo_554cm_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.7a\", \"matchCriteriaId\": \"62231E02-DD44-4308-B8E0-A0E018CCAB02\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_veo_554cm:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.7a\", \"matchCriteriaId\": \"C78BD917-F048-4334-81E2-E7C105666E44\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:medtronic:minimed_paradigm_veo_754cm_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90A1EFD8-109A-4728-A019-D895F9A7F361\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:medtronic:minimed_paradigm_veo_754cm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B302FC04-04EC-406A-828D-3B81482A6C3F\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In Medtronic MinMed 508 and Medtronic Minimed Paradigm Insulin Pumps, Versions, MiniMed 508 pump \\u2013 All versions, MiniMed Paradigm 511 pump \\u2013 All versions, MiniMed Paradigm 512/712 pumps \\u2013 All versions, MiniMed Paradigm 712E pump\\u2013All versions, MiniMed Paradigm 515/715 pumps\\u2013All versions, MiniMed Paradigm 522/722 pumps \\u2013 All versions,MiniMed Paradigm 522K/722K pumps \\u2013 All versions, MiniMed Paradigm 523/723 pumps \\u2013 Software versions 2.4A or lower, MiniMed Paradigm 523K/723K pumps \\u2013 Software, versions 2.4A or lower, MiniMed Paradigm Veo 554/754 pumps \\u2013 Software versions 2.6A or lower, MiniMed Paradigm Veo 554CM and 754CM models only \\u2013 Software versions 2.7A or lower, the affected insulin pumps are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.\"}, {\"lang\": \"es\", \"value\": \"En Medtronic MinMed 508 y Medtronic Minimed Paradigm Insulin Pumps, versiones, bomba MiniMed 508 - Todas las versiones, bomba MiniMed Paradigm 511 - Todas las versiones, bombas MiniMed Paradigm 512/712 - Todas las versiones, bomba MiniMed Paradigm 712E - Todas las versiones, MiniMed Paradigm 515 / Bombas 715: todas las versiones, bombas MiniMed Paradigm 522/722: todas las versiones, bombas MiniMed Paradigm 522K / 722K: todas las versiones, bombas MiniMed Paradigm 523/723: versiones de software 2.4A o inferiores, bombas MiniMed Paradigm 523K / 723K: software, versiones 2.4A o inferior, bombas MiniMed Paradigm Veo 554/754 - Versiones de software 2.6A o inferior, modelos MiniMed Paradigm Veo 554CM y 754CM solamente - Versiones de software 2.7A o inferior, las bombas de insulina afectadas est\\u00e1n dise\\u00f1adas para comunicarse usando una RF inal\\u00e1mbrica con otras dispositivos, como medidores de glucosa en sangre, transmisores de sensores de glucosa y dispositivos USB CareLink. Este protocolo de comunicaci\\u00f3n RF inal\\u00e1mbrico no implementa correctamente la autenticaci\\u00f3n o autorizaci\\u00f3n. Un atacante con acceso adyacente a uno de los modelos de bomba de insulina afectados puede inyectar, reproducir, modificar y / o interceptar datos. Esta vulnerabilidad tambi\\u00e9n podr\\u00eda permitir a los atacantes cambiar la configuraci\\u00f3n de la bomba y controlar la administraci\\u00f3n de insulina.\"}]",
      "id": "CVE-2019-10964",
      "lastModified": "2024-11-21T04:20:15.397",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 5.8, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.5, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-06-28T21:15:11.007",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/108926\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.us-cert.gov/ics/advisories/icsma-19-178-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/108926\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.us-cert.gov/ics/advisories/icsma-19-178-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}, {\"lang\": \"en\", \"value\": \"CWE-863\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-10964\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2019-06-28T21:15:11.007\",\"lastModified\":\"2025-05-22T19:15:22.413\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Medtronic MiniMed Insulin Pumps\\n\\n are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.\"},{\"lang\":\"es\",\"value\":\"En Medtronic MinMed 508 y Medtronic Minimed Paradigm Insulin Pumps, versiones, bomba MiniMed 508 - Todas las versiones, bomba MiniMed Paradigm 511 - Todas las versiones, bombas MiniMed Paradigm 512/712 - Todas las versiones, bomba MiniMed Paradigm 712E - Todas las versiones, MiniMed Paradigm 515 / Bombas 715: todas las versiones, bombas MiniMed Paradigm 522/722: todas las versiones, bombas MiniMed Paradigm 522K / 722K: todas las versiones, bombas MiniMed Paradigm 523/723: versiones de software 2.4A o inferiores, bombas MiniMed Paradigm 523K / 723K: software, versiones 2.4A o inferior, bombas MiniMed Paradigm Veo 554/754 - Versiones de software 2.6A o inferior, modelos MiniMed Paradigm Veo 554CM y 754CM solamente - Versiones de software 2.7A o inferior, las bombas de insulina afectadas est\u00e1n dise\u00f1adas para comunicarse usando una RF inal\u00e1mbrica con otras dispositivos, como medidores de glucosa en sangre, transmisores de sensores de glucosa y dispositivos USB CareLink. Este protocolo de comunicaci\u00f3n RF inal\u00e1mbrico no implementa correctamente la autenticaci\u00f3n o autorizaci\u00f3n. Un atacante con acceso adyacente a uno de los modelos de bomba de insulina afectados puede inyectar, reproducir, modificar y / o interceptar datos. Esta vulnerabilidad tambi\u00e9n podr\u00eda permitir a los atacantes cambiar la configuraci\u00f3n de la bomba y controlar la administraci\u00f3n de insulina.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.5}],\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"},{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_508_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DDE99AD-6C56-4366-97A8-E7350AA1EBB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_508:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E4916C-6DD1-4404-BD7B-B998569EDF14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_511_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E05835DE-DBD1-4FB9-B0C7-15785EE9026B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_511:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A13FBA6-5CCF-4E73-B6C9-6E3F7F962D43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_512_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65BE1432-6334-424A-B9A5-B5A14AC4F45B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_512:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9AD611A-CC28-4F92-B2B9-8401658FD713\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_712_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7247AD5D-C2DA-4A72-B719-2064571A536F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_712:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D67EC51-006F-4BC9-85BB-A1A7D597C1C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_712e_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"690D2311-70A2-44CD-899E-20FD3AD1AC8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_712e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C13A6A49-96C7-475A-B04E-FCE7D39CDE4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_515_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A1BA82-91A6-48AF-AC01-10FD19D92462\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_515:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55151631-78E7-42C3-BB25-AC69D36FD369\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_715_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A63ED6AA-EB20-4C68-A52D-BA8D548DEA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_715:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B626EAD3-2781-4DFD-9720-0399E197C383\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_522_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D6EB99-08D8-493E-BBCB-D7C3913CF4D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_522:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2EBD943-6BE9-4438-BAFD-32CA3165F635\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_722_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC192CC-0FD2-48E4-B19C-91C65DC4795B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_722:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9AD1FE7-B872-4E38-AAE9-E33BB5C4C665\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_522k_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D825C865-732D-4EBD-8452-6F1DA56D46CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_522k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D653E95-9FAE-403D-990F-669E6455571B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_722k_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AE31AD-579C-4EE9-A6C8-3B790521DAC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_722k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A42FD945-6BE8-4264-B90A-57CAA76AF8E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_523_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4a\",\"matchCriteriaId\":\"66A65D8E-2091-414D-B251-9144A0C57404\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_523:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A1C8C6-D38F-4CDB-95A8-2A64F559E678\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_723_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4a\",\"matchCriteriaId\":\"7238B959-5ADF-404E-8281-299762763597\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_723:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4604A5B1-9FB9-4CD8-8691-688C86C446F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_523k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4a\",\"matchCriteriaId\":\"053F180C-A81C-410C-97D9-90E1ABF8A3CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_523k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6519D44-D492-4CE8-88D9-0E0C6F716AF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_723k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4a\",\"matchCriteriaId\":\"3C4B5EFD-DC90-4F88-97D4-9B7919777F4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_723k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858EFED7-6FEE-45C5-90F9-6A7D381992D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_veo_554_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6a\",\"matchCriteriaId\":\"6831F875-8251-4FE2-AF83-627B7D55D1A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_veo_554:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"655937A8-0CD6-4BE1-A8C4-0D6CEB9E67CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_veo_754_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6a\",\"matchCriteriaId\":\"FE0CD31A-D8EC-4B3A-ADD6-B40B6F005D4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_veo_754:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026D0A22-334A-4B90-BA5E-182836258043\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_veo_554cm_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7a\",\"matchCriteriaId\":\"62231E02-DD44-4308-B8E0-A0E018CCAB02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_veo_554cm:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7a\",\"matchCriteriaId\":\"C78BD917-F048-4334-81E2-E7C105666E44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:medtronic:minimed_paradigm_veo_754cm_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A1EFD8-109A-4728-A019-D895F9A7F361\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:medtronic:minimed_paradigm_veo_754cm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B302FC04-04EC-406A-828D-3B81482A6C3F\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/108926\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://global.medtronic.com/xg-en/product-security/security-bulletins/minimed-508-paradigm.html\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-19-178-01\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"http://www.securityfocus.com/bid/108926\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsma-19-178-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…