With a specially crafted Python script, an attacker could send
continuous startMeasurement commands over an unencrypted Bluetooth
connection to the affected device. This would prevent the device from
connecting to a clinician's app to take patient readings and ostensibly
flood it with requests, resulting in a denial-of-service condition.
Fixes

Solution

No solution given by the vendor.


Workaround

Qardio has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact Qardio customer support https://www.qardio.com/about-us/#contact for additional information. Users should do the following to help mitigate the risk: * Disable Bluetooth when not in use. * Don't use this device in public or within Bluetooth range of malicious actors. * Only use trusted mobile apps from trusted providers.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00013}

epss

{'score': 0.00015}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00042}

epss

{'score': 0.00013}


Fri, 14 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 22:00:00 +0000

Type Values Removed Values Added
Description With a specially crafted Python script, an attacker could send continuous startMeasurement commands over an unencrypted Bluetooth connection to the affected device. This would prevent the device from connecting to a clinician's app to take patient readings and ostensibly flood it with requests, resulting in a denial-of-service condition.
Title Qardio Heart Health IOS and Android Application and QardioARM A100 Uncaught Exception
Weaknesses CWE-248
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H'}

cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-02-14T18:11:19.931Z

Reserved: 2025-02-10T15:16:25.257Z

Link: CVE-2025-24836

cve-icon Vulnrichment

Updated: 2025-02-14T18:11:13.515Z

cve-icon NVD

Status : Received

Published: 2025-02-13T22:15:12.270

Modified: 2025-02-13T22:15:12.270

Link: CVE-2025-24836

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.