CVE-2019-6538
📋 TL;DR
This vulnerability allows attackers with short-range physical access to medical devices to read and write memory values to implanted cardiac devices without authentication. It affects Medtronic cardiac devices using the Conexus telemetry protocol when their radio is enabled. Patients with affected implanted devices are at risk.
💻 Affected Systems
- Medtronic MyCareLink Monitor
- CareLink Monitor
- CareLink 2090 Programmer
- Amplia CRT-D
- Claria CRT-D
- Compia CRT-D
- Concerto CRT-D
- Concerto II CRT-D
- Consulta CRT-D
- Evera ICD
- Maximo II CRT-D and ICD
- Mirro ICD
- Nayamed ND ICD
- Primo ICD
- Protecta ICD and CRT-D
- Secura ICD
- Virtuoso ICD
- Virtuoso II ICD
- Visia AF ICD
- Viva CRT-D
📦 What is this software?
Maximo Ii Crt D And Lcd Firmware by Medtronic
Protecta Icd And Crt D Firmware by Medtronic
⚠️ Risk & Real-World Impact
Worst Case
An attacker could modify device memory to deliver inappropriate shocks, disable therapy, or drain battery, potentially causing patient harm or death.
Likely Case
Unauthorized reading of sensitive patient data or demonstration of capability to interfere with device operation.
If Mitigated
With radio disabled and physical security controls, risk is significantly reduced but not eliminated for devices that must communicate.
🎯 Exploit Status
Exploitation requires specialized RF equipment and knowledge of medical device protocols, but no authentication is needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified as version number - requires device replacement or monitor/programmer updates per Medtronic guidance
Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01
Restart Required: Yes
Instructions:
1. Contact Medtronic for affected device assessment. 2. For external devices: apply firmware updates if available. 3. For implanted devices: consult physician about potential replacement if high risk. 4. Disable telemetry radio when not in use.
🔧 Temporary Workarounds
Disable Telemetry Radio
allTurn off device radio functionality when not actively communicating with medical provider
Device-specific procedure via device interface
Physical Security Controls
allImplement access controls and monitoring in areas where devices are used or patients are present
🧯 If You Can't Patch
- Keep device radio disabled except during medically necessary communications
- Implement strict physical access controls and monitoring in healthcare facilities
🔍 How to Verify
Check if Vulnerable:
Check device model against affected list and confirm telemetry protocol is Conexus
Check Version:
Device-specific interface commands or Medtronic diagnostic tools
Verify Fix Applied:
Consult Medtronic for device-specific verification; implanted devices may require replacement
📡 Detection & Monitoring
Log Indicators:
- Unauthorized telemetry sessions
- Unexpected device memory access patterns
Network Indicators:
- RF signals in medical telemetry bands from unauthorized locations
SIEM Query:
Not applicable - primarily physical/radio frequency detection required