Medtronic MiniMed MMT devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.
Workaround:
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://global.medtronic.com/xg-en/product-security/security-bulletins/minimed.html | |
https://ics-cert.us-cert.gov/advisories/ICSMA-18-219-02 | third party advisory us government resource |
http://www.securityfocus.com/bid/105044 | vdb entry third party advisory |