Description
Medtronic MiniMed MMT

devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.
Published: 2018-08-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

The remote option is turned off in the pump by default.   Medtronic is directing all users to stop using their remote controllers, disable the remote option on their insulin pump, and to return the remote controllers to Medtronic. Medtronic has released additional patient focused information https://www.medtronic.com/security . Additionally, Medtronic will be sending a letter to patients who may still be actively using the remotes in order to inform patients about these security risks, and request patients stop using the remote and return them to Medtronic.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-6665 Medtronic MiniMed MMT devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00255}

epss

{'score': 0.00246}


Thu, 22 May 2025 16:45:00 +0000

Type Values Removed Values Added
Description Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolus" options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery. Medtronic MiniMed MMT devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.
Title Medtronic MiniMed MMT-500/MMT-503 Remote Controllers Authentication Bypass by Capture-replay
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Medtronicdiabetes 508 Minimed Insulin Pump 508 Minimed Insulin Pump Firmware 522 Paradigm Real-time 522 Paradigm Real-time Firmware 523 Paradigm Revel 523 Paradigm Revel Firmware 523k Paradigm Revel 523k Paradigm Revel Firmware 551 Minimed 530g 551 Minimed 530g Firmware 722 Paradigm Real-time 722 Paradigm Real-time Firmware 723 Paradigm Revel 723 Paradigm Revel Firmware 723k Paradigm Revel 723k Paradigm Revel Firmware 751 Minimed 530g 751 Minimed 530g Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-05-22T16:33:08.385Z

Reserved: 2018-08-01T00:00:00.000Z

Link: CVE-2018-14781

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-13T21:48:01.227

Modified: 2025-05-22T17:15:22.340

Link: CVE-2018-14781

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses