Medtronic Valleylab FT10 and FX8
Medtronic Valleylab FT10 and FX8 Energy Platforms and Exchange Client contain multiple vulnerabilities (hardcoded credentials, weak cryptography, insufficient input validation) that allow remote code execution and file overwrite. By default, network connections are disabled and the Ethernet port is disabled upon reboot; however, network connectivity is often enabled in practice. Successful exploitation results in non-root shell access on the affected devices. Medtronic has released patches for the FT10 platform and will release patches for the FX8 platform in early 2020. Until patches are applied, Medtronic recommends disconnecting devices from IP networks or segregating them so they are not accessible from untrusted networks.
- Network access to the affected device on its default ports (Ethernet port must be enabled—disabled by default but often enabled in practice)
- No valid credentials required (vulnerabilities involve hardcoded secrets or missing input validation)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2f495803-e508-49f0-b82e-98d4c92b4be7