Description
The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement encryption. An attacker with adjacent short-range access to a target product can listen to communications, including the transmission of sensitive data.
Published: 2019-03-26
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Medtronic has developed mitigating patches for a subset of the affected implanted cardiac device models. These patches are installed during regular office visits. Medtronic has stated that patches for additional impacted models are being developed by Medtronic and will be deployed through future updates. Patches are currently available for the following affected models: * Protecta CRT-D and implantable cardioverter defibrillators (ICDs), all models * Amplia MRI CRT-D, all models (patch available in U.S. only) * Claria MRI CRT-D, all models (patch available in U.S. only) * Compia MRI CRT-D, all models (patch available in U.S. only) * Visia AF MRI ICD, all models * Visia AF ICD, all models * Brava CRT-D, all models                                             * Evera MRI ICD, all models * Evera ICD, all models * Mirro MRI ICD, all models * Primo MRI ICD, all models * Viva CRT-D, all models


Vendor Workaround

Medtronic has applied additional controls for monitoring and responding to improper use of the Conexus telemetry protocol by the affected implanted cardiac devices. Additional mitigations are being developed and will be deployed through future updates, assuming regulatory approval. Medtronic recommends that users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: * Maintain good physical control over home monitors and programmers. * Use only home monitors, programmers, and implantable devices obtained directly from your healthcare provider or a Medtronic representative to ensure integrity of the system. * Do not connect unapproved devices to home monitors and programmers through USB ports or other physical connections. * Only use programmers to connect and interact with implanted devices in physically controlled hospital and clinical environments. * Only use home monitors in private environments such as a home, apartment, or otherwise physically controlled environment. * Report any concerning behavior regarding these products to your healthcare provider or a Medtronic representative. Medtronic has released additional patient focused information https://www.medtronic.com/security .

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-16099 The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement encryption. An attacker with adjacent short-range access to a target product can listen to communications, including the transmission of sensitive data.
History

Thu, 22 May 2025 19:30:00 +0000

Type Values Removed Values Added
Title Medtronic Conexus Radio Frequency Telemetry Protocol Cleartext Transmission of Sensitive Information

Subscriptions

Medtronic Amplia Crt-d Amplia Crt-d Firmware Carelink 2090 Carelink 2090 Firmware Carelink Monitor 2490c Carelink Monitor 2490c Firmware Claria Crt-d Claria Crt-d Firmware Compia Crt-d Compia Crt-d Firmware Concerto Crt-d Concerto Crt-d Firmware Concerto Ii Crt-d Concerto Ii Crt-d Firmware Consulta Crt-d Consulta Crt-d Firmware Evera Icd Evera Icd Firmware Maximo Ii Crt-d Maximo Ii Crt-d Firmware Maximo Ii Icd Maximo Ii Icd Firmware Mirro Icd Mirro Icd Firmware Mycarelink Monitor 24950 Mycarelink Monitor 24950 Firmware Mycarelink Monitor 24952 Mycarelink Monitor 24952 Firmware Nayamed Nd Icd Nayamed Nd Icd Firmware Primo Icd Primo Icd Firmware Protecta Crt-d Protecta Crt-d Firmware Protecta Icd Protecta Icd Firmware Secura Icd Secura Icd Firmware Virtuoso Icd Virtuoso Icd Firmware Virtuoso Ii Icd Virtuoso Ii Icd Firmware Visia Af Icd Visia Af Icd Firmware Viva Crt-d Viva Crt-d Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-05-22T19:23:42.770Z

Reserved: 2019-01-22T00:00:00.000Z

Link: CVE-2019-6540

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-26T18:29:01.060

Modified: 2025-05-22T20:15:21.027

Link: CVE-2019-6540

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses