{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-20615","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2025-02-10T15:16:25.268Z","datePublished":"2025-02-13T21:47:12.913Z","dateUpdated":"2025-02-14T15:46:53.224Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Heart Health IOS Mobile Application","vendor":"Qardio","versions":[{"status":"affected","version":"2.7.4"}]}],"credits":[{"lang":"en","type":"finder","value":"Bryan Riggins of Insulet Corporation reported these vulnerabilities to CISA."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The Qardio Arm iOS application exposes sensitive data such as usernames \nand passwords in a plist file. This allows an attacker to log in to \nproduction-level development accounts and access an engineering backdoor\n in the application. The engineering backdoor allows the attacker to \nsend hex-based commands over a UI-based terminal."}],"value":"The Qardio Arm iOS application exposes sensitive data such as usernames \nand passwords in a plist file. This allows an attacker to log in to \nproduction-level development accounts and access an engineering backdoor\n in the application. The engineering backdoor allows the attacker to \nsend hex-based commands over a UI-based terminal."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"PHYSICAL","availabilityImpact":"LOW","baseScore":6.2,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-359","description":"CWE-359","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2025-02-13T21:47:12.913Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-044-01"},{"url":"https://www.qardio.com/about-us/#contact"}],"source":{"advisory":"ICSMA-25-044-01","discovery":"EXTERNAL"},"title":"Qardio Heart Health IOS Mobile Application Exposure of Private Personal Information to an Unauthorized Actor","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Qardio has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of these affected products are invited to \ncontact <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.qardio.com/about-us/#contact\">Qardio customer support</a> for additional information.\n<p>Users should do the following to help mitigate the risk:</p>\n<ul>\n<li>Disable Bluetooth when not in use.</li>\n<li>Don't use this device in public or within Bluetooth range of malicious actors.</li>\n<li>Only use trusted mobile apps from trusted providers.</li>\n</ul>\n\n<br>"}],"value":"Qardio has not responded to requests to work with CISA to mitigate these\n vulnerabilities. Users of these affected products are invited to \ncontact  Qardio customer support https://www.qardio.com/about-us/#contact  for additional information.\nUsers should do the following to help mitigate the risk:\n\n\n\n  *  Disable Bluetooth when not in use.\n\n  *  Don't use this device in public or within Bluetooth range of malicious actors.\n\n  *  Only use trusted mobile apps from trusted providers."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-14T15:36:26.768218Z","id":"CVE-2025-20615","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-14T15:46:53.224Z"}}]}}