Medtronic 2090 CareLink Programmer’s software deployment network contains a directory traversal vulnerability that could allow an attacker to read files on the system.
Fixes

Solution

No solution given by the vendor.


Workaround

Medtronic has assessed the vulnerabilities and determined that no new potential safety risks were identified. In order to enhance system security, Medtronic has added periodic integrity checks for files associated with the software deployment network. Additionally, Medtronic has developed server-side security changes that further enhance security. Medtronic reports that they will not be issuing a product update; however, Medtronic has identified compensating controls within this advisory to reduce the risk of exploitation and reiterates the following from the CareLink 2090 Programmer Reference Manual: * Maintain good physical controls over the programmer. Having a secure physical environment prevents access to the internals of the programmer. * Only connect the programmer to managed, secure networks. * Update the software on the programmer when Medtronic updates are available. * Alternatively, disconnect the programmer from the network. Network connectivity is not required for normal programmer operation. * Offline updates are available, contact your Medtronic representative for more information. Medtronic has deployed mitigating patches to address the reported vulnerabilities. Medtronic has also stated that they have increased security controls associated with these vulnerabilities. As a result of the available mitigating patches, Medtronic has re-enabled the network-based software update mechanism. Medtronic has stated that the patch for affected products can be obtained by contacting Medtronic Technical Services at 800‑638‑1991. After additional review and risk evaluation of the affected products, Medtronic has disabled the network-based software update mechanism, including both the VPN and the HTTP subservices, as an immediate security mitigation. Users should not attempt to update the affected products over the network as this update mechanism is vulnerable to the attack described in section 4.2.3. Medtronic will continue to implement and deploy increased security protections and mitigations to address the vulnerabilities in this advisory. Users should still obtain and apply updates via controlled USB dongles and should contact their Medtronic representative for more information. Medtronic recommends that affected products continue to be used for their intended purpose in the previously described manner. Medtronic has released a security bulletin for the 2090 CareLink Programmer https://www.medtronic.com/security .

History

Thu, 22 May 2025 18:00:00 +0000

Type Values Removed Values Added
Description All versions of the Medtronic 2090 Carelink Programmer are affected by a directory traversal vulnerability where the product's software deployment network could allow an attacker to read files on the system. Medtronic 2090 CareLink Programmer’s software deployment network contains a directory traversal vulnerability that could allow an attacker to read files on the system.
Title Medtronic 2090 Carelink Programmer Relative Path Traversal
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-05-22T17:43:06.800Z

Reserved: 2018-01-12T00:00:00

Link: CVE-2018-5448

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-04T18:29:00.570

Modified: 2025-05-22T18:15:23.033

Link: CVE-2018-5448

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.