CVE-2019-6538

9.3 CRITICAL

📋 TL;DR

This vulnerability allows attackers with short-range physical access to medical devices to read and write memory values to implanted cardiac devices without authentication. It affects Medtronic cardiac devices using the Conexus telemetry protocol when their radio is enabled. Patients with affected implanted devices are at risk.

💻 Affected Systems

Products:
  • Medtronic MyCareLink Monitor
  • CareLink Monitor
  • CareLink 2090 Programmer
  • Amplia CRT-D
  • Claria CRT-D
  • Compia CRT-D
  • Concerto CRT-D
  • Concerto II CRT-D
  • Consulta CRT-D
  • Evera ICD
  • Maximo II CRT-D and ICD
  • Mirro ICD
  • Nayamed ND ICD
  • Primo ICD
  • Protecta ICD and CRT-D
  • Secura ICD
  • Virtuoso ICD
  • Virtuoso II ICD
  • Visia AF ICD
  • Viva CRT-D
Versions: Specific versions: 24950, 24952, 2490C
Operating Systems: Embedded medical device firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when device radio is turned on. Implanted devices cannot be patched; only external monitors/programmers can be updated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could modify device memory to deliver inappropriate shocks, disable therapy, or drain battery, potentially causing patient harm or death.

🟠

Likely Case

Unauthorized reading of sensitive patient data or demonstration of capability to interfere with device operation.

🟢

If Mitigated

With radio disabled and physical security controls, risk is significantly reduced but not eliminated for devices that must communicate.

🌐 Internet-Facing: LOW - Requires adjacent short-range access, not internet-accessible.
🏢 Internal Only: HIGH - Physical proximity to patient or device is sufficient for exploitation in healthcare settings.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires specialized RF equipment and knowledge of medical device protocols, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified as version number - requires device replacement or monitor/programmer updates per Medtronic guidance

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01

Restart Required: Yes

Instructions:

1. Contact Medtronic for affected device assessment. 2. For external devices: apply firmware updates if available. 3. For implanted devices: consult physician about potential replacement if high risk. 4. Disable telemetry radio when not in use.

🔧 Temporary Workarounds

Disable Telemetry Radio

all

Turn off device radio functionality when not actively communicating with medical provider

Device-specific procedure via device interface

Physical Security Controls

all

Implement access controls and monitoring in areas where devices are used or patients are present

🧯 If You Can't Patch

  • Keep device radio disabled except during medically necessary communications
  • Implement strict physical access controls and monitoring in healthcare facilities

🔍 How to Verify

Check if Vulnerable:

Check device model against affected list and confirm telemetry protocol is Conexus

Check Version:

Device-specific interface commands or Medtronic diagnostic tools

Verify Fix Applied:

Consult Medtronic for device-specific verification; implanted devices may require replacement

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized telemetry sessions
  • Unexpected device memory access patterns

Network Indicators:

  • RF signals in medical telemetry bands from unauthorized locations

SIEM Query:

Not applicable - primarily physical/radio frequency detection required

🔗 References

📤 Share & Export