devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Medtronicdiabetes
Subscribe
|
508 Minimed Insulin Pump
Subscribe
508 Minimed Insulin Pump Firmware
Subscribe
522 Paradigm Real-time
Subscribe
522 Paradigm Real-time Firmware
Subscribe
523 Paradigm Revel
Subscribe
523 Paradigm Revel Firmware
Subscribe
523k Paradigm Revel
Subscribe
523k Paradigm Revel Firmware
Subscribe
551 Minimed 530g
Subscribe
551 Minimed 530g Firmware
Subscribe
722 Paradigm Real-time
Subscribe
722 Paradigm Real-time Firmware
Subscribe
723 Paradigm Revel
Subscribe
723 Paradigm Revel Firmware
Subscribe
723k Paradigm Revel
Subscribe
723k Paradigm Revel Firmware
Subscribe
751 Minimed 530g
Subscribe
751 Minimed 530g Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-6665 | Medtronic MiniMed MMT devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery. |
Solution
No solution given by the vendor.
Workaround
The remote option is turned off in the pump by default. Medtronic is directing all users to stop using their remote controllers, disable the remote option on their insulin pump, and to return the remote controllers to Medtronic. Medtronic has released additional patient focused information https://www.medtronic.com/security . Additionally, Medtronic will be sending a letter to patients who may still be actively using the remotes in order to inform patients about these security risks, and request patients stop using the remote and return them to Medtronic.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 22 May 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolus" options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery. | Medtronic MiniMed MMT devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery. |
| Title | Medtronic MiniMed MMT-500/MMT-503 Remote Controllers Authentication Bypass by Capture-replay | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-22T16:33:08.385Z
Reserved: 2018-08-01T00:00:00
Link: CVE-2018-14781
No data.
Status : Modified
Published: 2018-08-13T21:48:01.227
Modified: 2025-05-22T17:15:22.340
Link: CVE-2018-14781
No data.
OpenCVE Enrichment
No data.
EUVD