{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"24950 MyCareLink Monitor","vendor":"Medtronic","versions":[{"status":"affected","version":"All versions"}]},{"defaultStatus":"unaffected","product":"24952 MyCareLink Monitor","vendor":"Medtronic","versions":[{"status":"affected","version":"All versions"}]}],"credits":[{"lang":"en","type":"finder","value":"Peter Morgan of Clever Security reported this vulnerability"}],"datePublic":"2018-06-29T06:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Medtronic 24950 MyCareLink Monitor and 24952 MyCareLink Monitor contains a hard-coded operating system password. An attacker with physical access can remove the case of the device, connect to the debug port, and use the password to gain privileged access to the operating system.</p>"}],"value":"Medtronic 24950 MyCareLink Monitor and 24952 MyCareLink Monitor contains a hard-coded operating system password. An attacker with physical access can remove the case of the device, connect to the debug port, and use the password to gain privileged access to the operating system."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"PHYSICAL","availabilityImpact":"HIGH","baseScore":6.4,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-259","description":"CWE-259","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2025-05-22T18:10:03.426Z"},"references":[{"url":"https://global.medtronic.com/xg-en/product-security/security-bulletins/mycarelink-6-28-18.html"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-179-01"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><span style=\"background-color: rgb(255, 255, 255);\">Medtronic will release several rolling over-the-air product updates that will mitigate the vulnerabilities described within this advisory. These updates will be applied to devices automatically as part of standard, reoccurring update processes. In addition, Medtronic has increased security monitoring of affected devices and related infrastructure. </span>\n\n</div>\n\n<p>Medtronic has released additional patient focused information, at the following location:</p><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.medtronic.com/security\">https://www.medtronic.com/security</a></p>\n\n<br>"}],"value":"Medtronic will release several rolling over-the-air product updates that will mitigate the vulnerabilities described within this advisory. These updates will be applied to devices automatically as part of standard, reoccurring update processes. In addition, Medtronic has increased security monitoring of affected devices and related infrastructure. \n\n\n\n\n\nMedtronic has released additional patient focused information, at the following location:\n\n https://www.medtronic.com/security"}],"source":{"advisory":"ICSMA-18-179-01","discovery":"EXTERNAL"},"title":"Medtronic MyCareLink Patient Monitor Use of Hard-coded Password","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Medtronic recommends users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:</p><ul><li>Maintain good physical controls over the home monitor as the best mitigation to these vulnerabilities. &nbsp;</li><li>Only use home monitors obtained directly from their healthcare provider or a Medtronic representative to ensure integrity of the system. </li><li>Report any concerning behavior regarding their home monitor to their healthcare provider or a Medtronic representative. </li></ul><p>Medtronic has released additional patient focused information, at the following location:</p><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.medtronic.com/security\">https://www.medtronic.com/security</a></p>\n\n<br>"}],"value":"Medtronic recommends users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:\n\n  *  Maintain good physical controls over the home monitor as the best mitigation to these vulnerabilities.  \n  *  Only use home monitors obtained directly from their healthcare provider or a Medtronic representative to ensure integrity of the system. \n  *  Report any concerning behavior regarding their home monitor to their healthcare provider or a Medtronic representative. \n\n\nMedtronic has released additional patient focused information, at the following location:\n\n https://www.medtronic.com/security"}],"x_generator":{"engine":"Vulnogram 0.2.0"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2018-06-29T00:00:00","ID":"CVE-2018-8870","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Medtronic MyCareLink Patient Monitor","version":{"version_data":[{"version_value":"24950 MyCareLink Monitor, all versions, 24952 MyCareLink Monitor, all versions."}]}}]},"vendor_name":"ICS-CERT"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Medtronic MyCareLink Patient Monitor, 24950 MyCareLink Monitor, all versions, and 24952 MyCareLink Monitor, all versions contains a hard-coded operating system password. An attacker with physical access can remove the case of the device, connect to the debug port, and use the password to gain privileged access to the operating system."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"USE OF HARD-CODED PASSWORD CWE-259"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-179-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-179-01"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T07:10:47.291Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-179-01"}]}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2018-8870","datePublished":"2018-07-02T18:00:00.000Z","dateReserved":"2018-03-20T00:00:00.000Z","dateUpdated":"2025-05-22T18:10:03.426Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}