Medtronic MyCareLink Smart 25000 contains
an authentication protocol vulnerability where the method used to authenticate between the MCL Smart Patient Reader and the Medtronic MyCareLink Smart mobile app is vulnerable to bypass. This vulnerability enables an attacker to use another mobile device or malicious application on the patient’s smartphone to authenticate to the patient’s Medtronic Smart Reader, fooling the device into believing it is communicating with the original Medtronic smart phone application when executed within range of Bluetooth communication.
References
Configurations
Configuration 1 (hide)
AND |
|
History
22 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Medtronic MyCareLink Smart 25000 contains an authentication protocol vulnerability where the method used to authenticate between the MCL Smart Patient Reader and the Medtronic MyCareLink Smart mobile app is vulnerable to bypass. This vulnerability enables an attacker to use another mobile device or malicious application on the patient’s smartphone to authenticate to the patient’s Medtronic Smart Reader, fooling the device into believing it is communicating with the original Medtronic smart phone application when executed within range of Bluetooth communication. | |
References |
|
|
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 8.0 |
21 Nov 2024, 05:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsma-20-345-01 - Third Party Advisory, US Government Resource |
Information
Published : 2020-12-14 20:15
Updated : 2025-05-22 20:15
NVD link : CVE-2020-25183
Mitre link : CVE-2020-25183
CVE.ORG link : CVE-2020-25183
JSON object : View
Products Affected
medtronic
- mycarelink_smart_model_25000_firmware
- mycarelink_smart_model_25000
CWE
CWE-287
Improper Authentication