Dario Health USB-C Blood Glucose Monitoring System Starter Kit Android Application
The Dario Health USB-C Blood Glucose Monitoring System Android application and its backend server infrastructure contain multiple vulnerabilities including insecure data transmission (CWE-319), information exposure (CWE-359), cross-site scripting (CWE-79), and code injection flaws (CWE-117, CWE-921). These vulnerabilities could allow attackers to intercept sensitive patient data, steal authentication credentials, manipulate glucose readings, or compromise user sessions. The flaws affect all versions of the server infrastructure and Android app versions 5.8.7.0.36 and earlier.
- Network access to the same network segment as the device running the Dario Android app or ability to intercept internet traffic (e.g., via public Wi-Fi or compromised router)
- No user authentication or special credentials required to intercept or manipulate traffic
/api/v1/advisories/4afde8df-b371-462e-acd7-40fa615e5838Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.