CVE-2025-24836

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to send continuous startMeasurement commands via unencrypted Bluetooth to affected medical devices, causing denial-of-service by preventing legitimate clinician connections. It affects Qardio medical devices used for patient monitoring.

💻 Affected Systems

Products:
  • Qardio medical monitoring devices
Versions: Specific versions not publicly disclosed in advisory
Operating Systems: Embedded device firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have Bluetooth enabled and be in pairing/discoverable mode.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical medical devices become unavailable for patient monitoring during medical emergencies, potentially delaying care.

🟠

Likely Case

Temporary disruption of device functionality requiring device restart and re-pairing.

🟢

If Mitigated

Minimal impact with proper network segmentation and Bluetooth security controls.

🌐 Internet-Facing: LOW - Requires physical proximity via Bluetooth (typically <10m range).
🏢 Internal Only: MEDIUM - Healthcare facilities with multiple devices in close proximity could experience cascading DoS.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires attacker to be within Bluetooth range and craft specific Python scripts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory - contact vendor

Vendor Advisory: https://www.qardio.com/about-us/#contact

Restart Required: No

Instructions:

1. Contact Qardio support for firmware updates. 2. Apply firmware patches as provided by vendor. 3. Verify Bluetooth functionality post-update.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

all

Turn off Bluetooth on devices when not actively monitoring patients

Device-specific - consult user manual

Implement Bluetooth pairing restrictions

all

Configure devices to only pair with authorized clinician devices

Device-specific - consult user manual

🧯 If You Can't Patch

  • Physically isolate devices in secure areas to limit Bluetooth range
  • Implement strict device usage policies requiring Bluetooth disablement between monitoring sessions

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor's patched versions

Check Version:

Device-specific - consult vendor documentation

Verify Fix Applied:

Test Bluetooth connectivity with legitimate devices and attempt to reproduce DoS condition

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed connection attempts
  • Unusual Bluetooth pairing requests
  • Device restart events

Network Indicators:

  • Excessive Bluetooth traffic from unknown MAC addresses
  • Repeated startMeasurement commands

SIEM Query:

bluetooth AND (startMeasurement OR connection_failed) WITH count > threshold

🔗 References

📤 Share & Export