CVE-2024-32368

7.3 HIGH

📋 TL;DR

This vulnerability allows a local attacker to cause denial of service on the Agasta Sanketlife 2.0 ECG monitor by exploiting insecure permissions in the Bluetooth Low Energy component. The attack requires physical proximity to the device and affects users of this specific medical device model. This could disrupt critical health monitoring functions.

💻 Affected Systems

Products:
  • Agasta Sanketlife 2.0 Pocket 12-Lead ECG Monitor
Versions: Firmware Version 3.0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with Bluetooth enabled and in pairing/discoverable mode. Medical devices in clinical or home healthcare settings are at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device failure requiring physical reset or replacement, potentially interrupting critical cardiac monitoring for patients who depend on continuous ECG tracking.

🟠

Likely Case

Temporary disruption of Bluetooth connectivity and device functionality requiring user intervention to restart the device, causing gaps in health data collection.

🟢

If Mitigated

Minimal impact with proper physical security controls and monitoring, though device may still experience brief connectivity interruptions.

🌐 Internet-Facing: LOW - Attack requires physical proximity via Bluetooth, not internet connectivity.
🏢 Internal Only: MEDIUM - Attack requires local Bluetooth access, which could be achieved by someone within ~10 meters of the device in healthcare settings.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains proof-of-concept code. Attack requires Bluetooth Low Energy knowledge but uses known BLE DoS techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Contact Agasta support for firmware update information. Check manufacturer website for security advisories.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

all

Turn off Bluetooth functionality on the ECG monitor except during active data transfer sessions

Device-specific: Use device settings menu to disable Bluetooth

Enable pairing mode only when needed

all

Keep device in non-discoverable mode and only enable pairing during initial setup or authorized connections

Device-specific: Use pairing button/settings to control discoverability

🧯 If You Can't Patch

  • Implement physical security controls to limit unauthorized access within Bluetooth range (approximately 10 meters)
  • Monitor device connectivity logs for unusual Bluetooth connection attempts or disconnection patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in settings menu. If version is 3.0 and Bluetooth is enabled, device is vulnerable.

Check Version:

Device-specific: Navigate to Settings > About Device > Firmware Version

Verify Fix Applied:

Verify firmware has been updated to a version later than 3.0 through device settings or manufacturer confirmation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed Bluetooth connection attempts
  • Unexpected device disconnections
  • Bluetooth service crashes

Network Indicators:

  • Unusual BLE traffic patterns
  • Repeated connection requests from unknown MAC addresses

SIEM Query:

Not applicable - embedded medical device typically doesn't integrate with enterprise SIEM systems

🔗 References

📤 Share & Export