Medtronic MyCareLink 24950 Patient Monitor
Hardcoded or insecurely stored credentials in Medtronic MyCareLink 24950 and 24952 monitors allow an attacker with physical access to extract per-product credentials used for authenticating data uploads to the CareLink network and encrypting data at rest. With these credentials, an attacker can upload falsified patient data to the CareLink server without authentication. Additionally, weak or missing verification of data integrity on the server allows invalid data to be accepted. Medtronic has implemented server-side updates to improve verification and is implementing additional mitigations for data integrity and authenticity. These vulnerabilities require physical device access and high skill level; no remote exploit path exists.
- Physical access to the 24950 or 24952 monitor
- Capability to extract firmware or memory contents (device disassembly or debug interface access)
- Knowledge of credential extraction techniques
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2be50ba8-c7e5-4d34-af20-a8c03a86e227