CVE-2016-5086

9.8 CRITICAL

📋 TL;DR

CVE-2016-5086 is an authentication bypass vulnerability in Johnson & Johnson Animas OneTouch Ping insulin pumps that allows attackers to replay previously captured communication packets to gain unauthorized access. This affects patients using these medical devices for insulin delivery, potentially allowing remote attackers to control insulin administration.

💻 Affected Systems

Products:
  • Johnson & Johnson Animas OneTouch Ping Insulin Pump
Versions: All versions prior to firmware update addressing this vulnerability
Operating Systems: Embedded medical device firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices use unencrypted RF communication for remote control functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker could deliver lethal insulin doses to patient, causing severe hypoglycemia or death.

🟠

Likely Case

Unauthorized access to device settings allowing manipulation of insulin delivery rates, potentially causing dangerous blood sugar levels.

🟢

If Mitigated

With proper network segmentation and monitoring, risk reduces to unauthorized access attempts being detected before harm occurs.

🌐 Internet-Facing: HIGH - Devices communicate wirelessly and can be accessed remotely via radio frequency.
🏢 Internal Only: HIGH - Attackers within radio range (approximately 10-20 feet) can exploit without network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit tools and research published by Rapid7 and security researchers demonstrate practical attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware update released by Johnson & Johnson in 2016

Vendor Advisory: https://www.animas.com/safety-notice

Restart Required: Yes

Instructions:

1. Contact Johnson & Johnson/Animas for firmware update. 2. Follow medical device update procedures. 3. Verify new firmware version. 4. Test device functionality post-update.

🔧 Temporary Workarounds

Disable remote control feature

all

Disable the OneTouch Ping remote control functionality to prevent RF communication attacks

Device-specific menu settings to disable remote control

Physical isolation

all

Keep device in RF-shielded case when not in use to prevent unauthorized access

🧯 If You Can't Patch

  • Replace vulnerable devices with updated models or alternative insulin delivery systems
  • Implement strict physical security controls and monitoring for unauthorized RF signals near patient

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Johnson & Johnson security bulletin. Devices manufactured before 2016 firmware update are vulnerable.

Check Version:

Check device settings menu for firmware version information

Verify Fix Applied:

Verify firmware version shows post-2016 update. Test RF communication requires authentication.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Unexpected RF communication patterns

Network Indicators:

  • Unusual RF signal patterns in medical device frequency ranges
  • Repeated authentication packets

SIEM Query:

Medical device logs showing authentication bypass or unexpected remote control commands

🔗 References

📤 Share & Export