uses a per-product username and password that is stored in a recoverable format.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Medtronic has assessed the vulnerabilities and determined that no new potential safety risks were identified. In order to enhance system security, Medtronic has added periodic integrity checks for files associated with the software deployment network. Additionally, Medtronic has developed server-side security changes that further enhance security. Medtronic reports that they will not be issuing a product update; however, Medtronic has identified compensating controls within this advisory to reduce the risk of exploitation and reiterates the following from the CareLink 2090 Programmer Reference Manual: * Maintain good physical controls over the programmer. Having a secure physical environment prevents access to the internals of the programmer. * Only connect the programmer to managed, secure networks. * Update the software on the programmer when Medtronic updates are available. * Alternatively, disconnect the programmer from the network. Network connectivity is not required for normal programmer operation. * Offline updates are available, contact your Medtronic representative for more information. Medtronic has deployed mitigating patches to address the reported vulnerabilities. Medtronic has also stated that they have increased security controls associated with these vulnerabilities. As a result of the available mitigating patches, Medtronic has re-enabled the network-based software update mechanism. Medtronic has stated that the patch for affected products can be obtained by contacting Medtronic Technical Services at 800‑638‑1991. After additional review and risk evaluation of the affected products, Medtronic has disabled the network-based software update mechanism, including both the VPN and the HTTP subservices, as an immediate security mitigation. Users should not attempt to update the affected products over the network as this update mechanism is vulnerable to the attack described in section 4.2.3. Medtronic will continue to implement and deploy increased security protections and mitigations to address the vulnerabilities in this advisory. Users should still obtain and apply updates via controlled USB dongles and should contact their Medtronic representative for more information. Medtronic recommends that affected products continue to be used for their intended purpose in the previously described manner. Medtronic has released a security bulletin for the 2090 CareLink Programmer https://www.medtronic.com/security .
Thu, 22 May 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All versions of the Medtronic 2090 Carelink Programmer are affected by a per-product username and password that is stored in a recoverable format which could allow an attacker with physical access to a 2090 Programmer to obtain per-product credentials to the software deployment network. | Medtronic 2090 CareLink Programmer uses a per-product username and password that is stored in a recoverable format. |
Title | Medtronic 2090 Carelink Programmer Storing Passwords in a Recoverable Format | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-22T17:40:34.569Z
Reserved: 2018-01-12T00:00:00
Link: CVE-2018-5446

No data.

Status : Modified
Published: 2018-05-04T18:29:00.523
Modified: 2025-05-22T18:15:22.840
Link: CVE-2018-5446

No data.

No data.