The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device.
History

Thu, 22 May 2025 19:30:00 +0000

Type Values Removed Values Added
Title Medtronic Conexus Radio Frequency Telemetry Protocol Improper Access Control
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2019-03-25T21:26:03

Updated: 2025-05-22T19:26:15.126Z

Reserved: 2019-01-22T00:00:00

Link: CVE-2019-6538

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-25T22:29:00.763

Modified: 2025-05-22T20:15:20.660

Link: CVE-2019-6538

cve-icon Redhat

No data.