Medtronic MyCareLink Patient Monitor
The MyCareLink Monitor (models 24952 and 24950) contains vulnerabilities (CWE-259 hardcoded credentials, CWE-749 improper control of interaction frequency) that could allow privileged access to the monitor's operating system with physical access. Additionally, when operated in close proximity to implantable cardiac devices (pacemakers, defibrillators), the monitor can read and write arbitrary memory values in those devices. Medtronic has stated rolling over-the-air updates will mitigate these issues through standard automatic update processes and has increased security monitoring of affected infrastructure.
- Physical access to the MyCareLink monitor
- Monitor must be in close physical proximity to an implantable cardiac device (pacemaker or defibrillator) to exploit device memory
- Knowledge of exploitation technique for hardcoded or weak credentials (CWE-259)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/49ae3685-6a30-4fdd-8e4a-c7b854c3c24bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.