CVE-2023-31222

Medtronic Paceart MSMQ Deserialization of Untrusted Data

Description

Deserialization of untrusted data in Microsoft Messaging Queuing Service in Medtronic's Paceart Optima versions 1.11 and earlier on Windows allows an unauthorized user to impact a healthcare delivery organization’s Paceart Optima system cardiac device causing data to be deleted, stolen, or modified, or the Paceart Optima system being used for further network penetration via network connectivity.

Remediation

Solution:

  • Refer to Medtronic Security Bulletin:  https://global.medtronic.com/xg-en/product-security/security-bulletins/paceart-optima-system.html https://global.medtronic.com/xg-en/product-security/security-bulletins/paceart-optima-system.html

Workaround:

  • Refer to Medtronic Security Bulletin: https://global.medtronic.com/xg-en/product-security/security-bulletins/paceart-optima-system.html https://global.medtronic.com/xg-en/product-security/security-bulletins/paceart-optima-system.html

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 29.68% Top 5%
Vendor Advisory medtronic.com
Affected: Medtronic Paceart Optima
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-31222?
CVE-2023-31222 has been scored as a critical severity vulnerability.
How to fix CVE-2023-31222?
To fix CVE-2023-31222: Refer to Medtronic Security Bulletin:  https://global.medtronic.com/xg-en/product-security/security-bulletins/paceart-optima-system.html https://global.medtronic.com/xg-en/product-security/security-bulletins/paceart-optima-system.html
Is CVE-2023-31222 being actively exploited in the wild?
It is possible that CVE-2023-31222 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~30% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-31222?
CVE-2023-31222 affects Medtronic Paceart Optima .
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.