BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsma-20-170-05 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2020-06-29T13:56:28
Updated: 2020-06-29T13:56:28
Reserved: 2019-10-22T00:00:00
Link: CVE-2019-18256
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-29T14:15:10.787
Modified: 2021-10-29T19:58:24.023
Link: CVE-2019-18256
JSON object: View
Redhat Information
No data.