Medtronic Conexus Radio Frequency Telemetry Protocol (Update C)
Multiple Medtronic implanted cardiac devices (ICDs, CRT-Ds) and their associated programmers and monitoring systems are vulnerable to wireless RF protocol attacks. An attacker with RF transmission capability and physical proximity to an affected device can intercept, modify, or inject commands into Conexus telemetry communication, potentially altering device settings, disabling safety features, or reading patient data from device memory. Exploitation requires no authentication and can occur during clinic programming sessions, post-implant procedures, or during the device's periodic automated RF transmissions. Medtronic has confirmed that patches are available for only a subset of affected models; patches for remaining models are in development and subject to regulatory approval.
- RF transmitter/receiver device capable of Conexus protocol (programmer, monitor, or SDR)
- Physical proximity to implanted device (1-2 meters, adjacent/near-field range)
- Implanted device RF radio must be active (during clinic session, procedure, or scheduled follow-up transmission)
- No valid credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/966e9ffd-72d8-4019-b931-bf9a8f8e1f52