Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-2694 | Medtronic MyCareLink Patient Monitor uses per-product credentials that are stored in a recoverable format. An attacker can use these credentials for network authentication and encryption of local data at rest. |
Solution
No solution given by the vendor.
Workaround
Medtronic has made server-side updates to address the insufficient verification vulnerability identified in this advisory. Medtronic is implementing additional server-side mitigations to enhance data integrity and authenticity. Medtronic recommends users take additional defensive measures to minimize the risk of exploitation. Specifically, users should: * Maintain good physical control over the home monitor. * Only use home monitors obtained directly from their healthcare provider or a Medtronic representative to ensure integrity of the system. Medtronic has released additional patient focused information, at the following location: https://www.medtronic.com/security
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 22 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was discovered in all versions of Medtronic MyCareLink 24950 and 24952 Patient Monitor. The affected products use per-product credentials that are stored in a recoverable format. An attacker can use these credentials for network authentication and encryption of local data at rest. | Medtronic MyCareLink Patient Monitor uses per-product credentials that are stored in a recoverable format. An attacker can use these credentials for network authentication and encryption of local data at rest. |
| Title | Medtronic MyCareLink 24950 Patient Monitor Storing Passwords in a Recoverable Format | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-22T16:12:44.522Z
Reserved: 2018-05-01T00:00:00
Link: CVE-2018-10622
No data.
Status : Modified
Published: 2018-08-10T18:29:00.230
Modified: 2025-05-22T16:15:50.047
Link: CVE-2018-10622
No data.
OpenCVE Enrichment
No data.
EUVD