Description

The physical IoT device of the AliveCor's KardiaMobile, a smartphone-based personal electrocardiogram (EKG) has no encryption for its data-over-sound protocols. Exploiting this vulnerability could allow an attacker to read patient EKG results or create a denial-of-service condition by emitting sounds at similar frequencies as the device, disrupting the smartphone microphone’s ability to accurately read the data. To carry out this attack, the attacker must be close (less than 5 feet) to pick up and emit sound waves.

Published: 2022-10-27
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Alivecor Kardiamobile Kardiamobile 6l Kardiamobile 6l Firmware Kardiamobile Card Kardiamobile Card Firmware Kardiamobile Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:08:30.914Z

Reserved: 2022-09-29T14:09:27.495Z

Link: CVE-2022-41627

cve-icon Vulnrichment

Updated: 2024-08-03T12:49:43.451Z

cve-icon NVD

Status : Modified

Published: 2022-10-27T21:15:15.573

Modified: 2024-11-21T07:23:31.537

Link: CVE-2022-41627

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses