CVE-2019-13539

Medtronic Valleylab FT10 and FX8 Reversible One-way Hash

Description

Medtronic Valleylab Exchange Client version 3.4 and below, Valleylab FT10 Energy Platform (VLFT10GEN) software version 4.0.0 and below, and Valleylab FX8 Energy Platform (VLFX8GEN) software version 1.1.0 and below use the descrypt algorithm for OS password hashing. While interactive, network-based logons are disabled, and attackers can use the other vulnerabilities within this report to obtain local shell access and access these hashes.

Remediation

Solution:

  • Software patches are currently available for the FT10 platform and will be available in early 2020 for the FX8 platform. Until these updates can be applied, Medtronic recommends to either disconnect affected products from IP networks or to segregate those networks, such that the devices are not accessible from an untrusted network (e.g., Internet). Patches can be downloaded at the following location: https://www.medtronic.com/covidien/en-us/support/software.html Medtronic has released additional patient focused information, at the following location: https://www.medtronic.com/security

Categories

7.0
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.04%
Third-Party Advisory us-cert.gov
Affected: Medtronic Valleylab Exchange Client
Affected: Medtronic Valleylab FT10 Energy Platform (VLFT10GEN)
Affected: Medtronic Valleylab FX8 Energy Platform (VLFX8GEN)
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2019-13539?
CVE-2019-13539 has been scored as a high severity vulnerability.
How to fix CVE-2019-13539?
To fix CVE-2019-13539: Software patches are currently available for the FT10 platform and will be available in early 2020 for the FX8 platform. Until these updates can be applied, Medtronic recommends to either disconnect affected products from IP networks or to segregate those networks, such that the devices are not accessible from an untrusted network (e.g., Internet). Patches can be downloaded at the following location: https://www.medtronic.com/covidien/en-us/support/software.html Medtronic has released additional patient focused information, at the following location: https://www.medtronic.com/security
Is CVE-2019-13539 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2019-13539 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2019-13539?
CVE-2019-13539 affects Medtronic Valleylab Exchange Client, Medtronic Valleylab FT10 Energy Platform (VLFT10GEN), Medtronic Valleylab FX8 Energy Platform (VLFX8GEN).
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.