Description
BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.
Published: 2020-06-29
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-8054 BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.
History

No history.

Subscriptions

Biotronik Cardiomessenger Ii-s Gsm Cardiomessenger Ii-s Gsm Firmware Cardiomessenger Ii-s T-line Cardiomessenger Ii-s T-line Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-05T01:47:14.076Z

Reserved: 2019-10-22T00:00:00.000Z

Link: CVE-2019-18256

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-29T14:15:10.787

Modified: 2024-11-21T04:32:55.923

Link: CVE-2019-18256

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses