Medtronic 2090 CareLink Programmer

uses a per-product username and password that is stored in a recoverable format.
Fixes

Solution

No solution given by the vendor.


Workaround

Medtronic has assessed the vulnerabilities and determined that no new potential safety risks were identified. In order to enhance system security, Medtronic has added periodic integrity checks for files associated with the software deployment network. Additionally, Medtronic has developed server-side security changes that further enhance security. Medtronic reports that they will not be issuing a product update; however, Medtronic has identified compensating controls within this advisory to reduce the risk of exploitation and reiterates the following from the CareLink 2090 Programmer Reference Manual: * Maintain good physical controls over the programmer. Having a secure physical environment prevents access to the internals of the programmer. * Only connect the programmer to managed, secure networks. * Update the software on the programmer when Medtronic updates are available. * Alternatively, disconnect the programmer from the network. Network connectivity is not required for normal programmer operation. * Offline updates are available, contact your Medtronic representative for more information. Medtronic has deployed mitigating patches to address the reported vulnerabilities. Medtronic has also stated that they have increased security controls associated with these vulnerabilities. As a result of the available mitigating patches, Medtronic has re-enabled the network-based software update mechanism. Medtronic has stated that the patch for affected products can be obtained by contacting Medtronic Technical Services at 800‑638‑1991. After additional review and risk evaluation of the affected products, Medtronic has disabled the network-based software update mechanism, including both the VPN and the HTTP subservices, as an immediate security mitigation. Users should not attempt to update the affected products over the network as this update mechanism is vulnerable to the attack described in section 4.2.3. Medtronic will continue to implement and deploy increased security protections and mitigations to address the vulnerabilities in this advisory. Users should still obtain and apply updates via controlled USB dongles and should contact their Medtronic representative for more information. Medtronic recommends that affected products continue to be used for their intended purpose in the previously described manner. Medtronic has released a security bulletin for the 2090 CareLink Programmer https://www.medtronic.com/security .

History

Thu, 22 May 2025 18:00:00 +0000

Type Values Removed Values Added
Description All versions of the Medtronic 2090 Carelink Programmer are affected by a per-product username and password that is stored in a recoverable format which could allow an attacker with physical access to a 2090 Programmer to obtain per-product credentials to the software deployment network. Medtronic 2090 CareLink Programmer uses a per-product username and password that is stored in a recoverable format.
Title Medtronic 2090 Carelink Programmer Storing Passwords in a Recoverable Format
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-05-22T17:40:34.569Z

Reserved: 2018-01-12T00:00:00

Link: CVE-2018-5446

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-04T18:29:00.523

Modified: 2025-05-22T18:15:22.840

Link: CVE-2018-5446

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.