Connect with us

Hi, what are you looking for?


IoT Security

Medtronic Releases Patches for Cardiac Device Flaws Disclosed in 2018, 2019

Medical device company Medtronic informed customers last week that it has released patches for some cardiac device vulnerabilities disclosed in 2018 and 2019. The vendor says it takes time to develop and validate patches for such complex and safety-critical devices.

Medical device company Medtronic informed customers last week that it has released patches for some cardiac device vulnerabilities disclosed in 2018 and 2019. The vendor says it takes time to develop and validate patches for such complex and safety-critical devices.

Both Medtronic and the DHS’s Cybersecurity and Infrastructure Security Agency (CISA) updated their original advisories last week to inform users about the availability of patches. The vendor initially provided mitigations to allow customers to continue using the devices and it has now started releasing software patches.

Medtronic told SecurityWeek that the development of the patches took so long due to the required regulatory approvals.Medtronic CareLink

“Implanted medical devices are complex and safety critical,” the company said. “As a result, development and validation can take a significant amount of time and also includes a required regulatory review process before we can distribute updates to products. Medtronic worked to develop security remediations quickly while also ensuring the patches continue to maintain comprehensive safety and functionality.”

One of the advisories, initially published in March 2019 by both CISA and Medtronic, covers vulnerabilities affecting the Medtronic Conexus radio frequency wireless telemetry protocol used by some of the company’s implantable cardioverter defibrillators (ICDs) and cardiac resynchronization therapy defibrillators (CRT-Ds).

Researchers from various universities revealed last year that they had identified potentially serious vulnerabilities in the Conexus telemetry protocol, including the lack of authentication and authorization, as well as the lack of encryption for communications. These weaknesses can be exploited by an attacker with access to an affected product to intercept, replay or modify data, and allow them to change the settings of implantable devices, home monitors and clinic programmers.

The second advisory, first published in February 2018, describes security holes identified by researchers Billy Rios and Jonathan Butts in Medtronic’s CareLink 2090 and CareLink Encore 29901 devices designed for programming and managing cardiac devices.

The researchers discovered that these devices have vulnerabilities that can be exploited to obtain device usernames and passwords, access files on the system, and push malicious updates via man-in-the-middle (MitM) attacks.

Advertisement. Scroll to continue reading.

The company has now released patches for nearly half of the devices impacted by the Conexus vulnerabilities, which represents the first phase of security updates. More updates are expected to become available later this year.

In the case of the CareLink vulnerabilities, following the disclosure of the vulnerabilities, the company disabled access to the software deployment network (SDN) used to deliver device updates. In the meantime, software updates for the programmers have been installed manually via a secured USB.

Now that the vulnerabilities have been patched, the SDN has been re-enabled and customers can once again use it to get updates, or they can continue receiving programmer updates via USB.

The company says it’s conducting security checks to look for unauthorized or unusual activity that could be related to these vulnerabilities, but so far it has not seen any cyberattacks, privacy breaches or patient harm associated with these issues.

Related: Some Medtronic Insulin Pumps Vulnerable to Hacker Attacks

Related: DHS Warns of Critical Flaws in Medtronic Medical Devices

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.