CVE-2020-25183

Medtronic MyCareLink Smart Improper Authentication

Description

Medtronic MyCareLink Smart 25000 contains an authentication protocol vulnerability where the method used to authenticate between the MCL Smart Patient Reader and the Medtronic MyCareLink Smart mobile app is vulnerable to bypass. This vulnerability enables an attacker to use another mobile device or malicious application on the patient’s smartphone to authenticate to the patient’s Medtronic Smart Reader, fooling the device into believing it is communicating with the original Medtronic smart phone application when executed within range of Bluetooth communication.

Remediation

Solution:

  • A firmware update to eliminates these vulnerabilities has been developed by Medtronic and is available by updating the MyCareLink Smartapp via the associated mobile application store. Upgrading to the latest v5.2 mobile application version will ensure the Patient Reader is also updated on next use. The user’s smart phone must be updated to the following operating system version for the patches to be applied: iOS 10 and above; Android 6.0 and above. Medtronic has released additional patient focused information https://www.medtronic.com/security : https://www.medtronic.com/xg-en/product-security/security-bulletins.html https://www.medtronic.com/xg-en/product-security/security-bulletins.html

Workaround:

  • In response to these vulnerabilities, Medtronic has applied additional controls for monitoring and responding to improper use of the MCL Smart Patient Reader: * Medtronic has implemented enhanced integrity validation (EIV) technology, which provides early detection and real-time mitigation of known vulnerability exploitation attempts. * Medtronic has also implemented advanced detection system technology, which enables device-level logging and monitoring of all device activity and behavior. Medtronic recommends that users take additional defensive measures to minimize risk. Specifically, users should: * Maintain good physical control over home monitors. * This includes only using home monitors in private environments such as a home, apartment, or otherwise physically controlled environment. * Use only home monitors obtained directly from your healthcare provider or a Medtronic representative. * Patients should ensure that the operating system of their mobile phone is updated to the latest version of the available Android or Apple iOS operating system. Report any concerning behavior regarding these products to your healthcare provider or a Medtronic representative.

Category

8.0
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.05%
Third-Party Advisory cisa.gov
Affected: Medtronic Smart Model 25000 Patient Reader
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-25183?
CVE-2020-25183 has been scored as a high severity vulnerability.
How to fix CVE-2020-25183?
To fix CVE-2020-25183: A firmware update to eliminates these vulnerabilities has been developed by Medtronic and is available by updating the MyCareLink Smartapp via the associated mobile application store. Upgrading to the latest v5.2 mobile application version will ensure the Patient Reader is also updated on next use. The user’s smart phone must be updated to the following operating system version for the patches to be applied: iOS 10 and above; Android 6.0 and above. Medtronic has released additional patient focused information https://www.medtronic.com/security : https://www.medtronic.com/xg-en/product-security/security-bulletins.html https://www.medtronic.com/xg-en/product-security/security-bulletins.html
Is CVE-2020-25183 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-25183 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-25183?
CVE-2020-25183 affects Medtronic Smart Model 25000 Patient Reader.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.