AliveCor KardiaMobile
AliveCor KardiaMobile and the associated Kardia App contain vulnerabilities in their data-over-sound communication protocol. The protocol lacks encryption, allowing attackers within close physical range to intercept, eavesdrop on, or modify cardiogram data transmitted between the KardiaMobile device and the Kardia smartphone app. Successful exploitation could lead to theft of personal health information, creation of fake cardiogram readings, or denial-of-service attacks. However, exploitation requires close physical proximity and the vendor has acknowledged the unencrypted protocol but states the circumstances necessary for exploitation are unlikely.
- Close physical proximity to both the KardiaMobile device and the smartphone running the Kardia app during data transmission
- No authentication required; the data-over-sound protocol lacks encryption
/api/v1/advisories/ccc5d480-999f-4159-85ca-5c22a90c97dfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.