CVE-2020-27373

8.8 HIGH

📋 TL;DR

The Dr Trust USA iCheck Connect BP Monitor version 1.2.1 accepts plain text commands over Bluetooth Low Energy (BLE) without authentication or encryption. This allows attackers within BLE range to send arbitrary commands to the device, potentially manipulating blood pressure readings or device functionality. Only users of this specific blood pressure monitor model and version are affected.

💻 Affected Systems

Products:
  • Dr Trust USA iCheck Connect BP Monitor
Versions: 1.2.1
Operating Systems: Device firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the BLE communication protocol implementation. All devices with this firmware version are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could manipulate blood pressure readings to provide false medical data, potentially leading to incorrect treatment decisions or hiding serious health conditions from patients and healthcare providers.

🟠

Likely Case

Attackers could disrupt device functionality, cause inaccurate readings, or perform denial-of-service attacks against the blood pressure monitor.

🟢

If Mitigated

With proper BLE security controls and physical security, the attack surface is limited to devices within close physical proximity (typically <100 meters).

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity to the device and basic BLE communication tools. The vulnerability is well-documented in public research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Contact Dr Trust USA for firmware update information. Consider replacing the device if security is critical.

🔧 Temporary Workarounds

Disable BLE when not in use

all

Turn off Bluetooth on the blood pressure monitor when not actively syncing with mobile apps

Refer to device manual for Bluetooth disable procedure

Physical security controls

all

Restrict physical access to the device and use it in controlled environments only

🧯 If You Can't Patch

  • Use the device in physically secure locations away from untrusted individuals
  • Verify blood pressure readings through manual validation or secondary measurement devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in companion mobile app or device settings. If version is 1.2.1, the device is vulnerable.

Check Version:

Check through companion mobile app or device display settings

Verify Fix Applied:

Update to a firmware version later than 1.2.1 if available from the manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Unusual BLE connection attempts in mobile app logs
  • Unexpected device behavior or reading anomalies

Network Indicators:

  • Unusual BLE traffic patterns near medical devices
  • Multiple failed or suspicious BLE connection attempts

SIEM Query:

Not applicable for standalone medical IoT devices without network logging capabilities

🔗 References

📤 Share & Export