Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-10631

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-13 Jul, 2018 | 19:00
Updated At-26 Aug, 2025 | 14:26
Rejected At-
Credits

Medtronic N'Vision Clinician Programmer Protection Mechanism Failure

The 8840 Clinician Programmer executes the application program from the 8870 Application Card. An attacker with physical access to an 8870 Application Card and sufficient technical capability can modify the contents of this card, including the binary executables. If modified to bypass protection mechanisms, this malicious code will be run when the card is inserted into an 8840 Clinician Programmer.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:13 Jul, 2018 | 19:00
Updated At:26 Aug, 2025 | 14:26
Rejected At:
▼CVE Numbering Authority (CNA)
Medtronic N'Vision Clinician Programmer Protection Mechanism Failure

The 8840 Clinician Programmer executes the application program from the 8870 Application Card. An attacker with physical access to an 8870 Application Card and sufficient technical capability can modify the contents of this card, including the binary executables. If modified to bypass protection mechanisms, this malicious code will be run when the card is inserted into an 8840 Clinician Programmer.

Affected Products
Vendor
Medtronic
Product
8840 N’Vision Clinician Programmer
Default Status
unaffected
Versions
Affected
  • All versions
Vendor
Medtronic
Product
8870 N’Vision removable Application Card
Default Status
unaffected
Versions
Affected
  • All versions
Problem Types
TypeCWE IDDescription
CWECWE-693CWE-693
Type: CWE
CWE ID: CWE-693
Description: CWE-693
Metrics
VersionBase scoreBase severityVector
3.16.3MEDIUM
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Medtronic has not developed a product update to address the vulnerabilities, but is reinforcing security reminders within this advisory to help reduce the risk associated with the vulnerabilities. The 8870 Therapy Application card stores PHI and PII as part of its normal operating procedure and should be handled, managed and secured in a manner consistent with the applicable laws for patient data privacy. Medtronic recommends users take additional defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, hospitals and clinicians should: * Maintain strict physical control of the 8870 application card. * Use only legitimately obtained 8870 cards and not cards provided by any third party as firmware and system updates are provided directly by Medtronic using new 8870 application cards. * 8840 Programmers and 8870 Therapy Application compact flash cards are the property of Medtronic and should be returned to Medtronic when no longer in use. If that is not an option, you should securely dispose of them. Medtronic has released additional patient focused information, at the following location: https://www.medtronic.com/security

Exploits

Credits

finder
Billy Rios and Jonathan Butts of Whitescope LLC reported this vulnerability
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://global.medtronic.com/xg-en/product-security/security-bulletins/nvision.html
N/A
https://www.medtronic.com/security
N/A
https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01
N/A
http://www.securityfocus.com/bid/104213
N/A
Hyperlink: https://global.medtronic.com/xg-en/product-security/security-bulletins/nvision.html
Resource: N/A
Hyperlink: https://www.medtronic.com/security
Resource: N/A
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/104213
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01
x_refsource_MISC
x_transferred
https://www.medtronic.com/security
x_refsource_MISC
x_transferred
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.medtronic.com/security
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
ics_cert
Product
medtronic_n_vision_clinician_programmer
CPEs
  • cpe:2.3:a:ics_cert:medtronic_n_vision_clinician_programmer:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 8840_n_vision_clinician_programmer through * (custom)
  • 8870_n_vision_removable_application_card
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:13 Jul, 2018 | 19:29
Updated At:26 Aug, 2025 | 15:15

The 8840 Clinician Programmer executes the application program from the 8870 Application Card. An attacker with physical access to an 8870 Application Card and sufficient technical capability can modify the contents of this card, including the binary executables. If modified to bypass protection mechanisms, this malicious code will be run when the card is inserted into an 8840 Clinician Programmer.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.3MEDIUM
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary3.06.8MEDIUM
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Secondary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

medtronic
medtronic
>>n\'vision_8840_firmware>>-
cpe:2.3:o:medtronic:n\'vision_8840_firmware:-:*:*:*:*:*:*:*
medtronic
medtronic
>>n\'vision_8840>>-
cpe:2.3:h:medtronic:n\'vision_8840:-:*:*:*:*:*:*:*
medtronic
medtronic
>>n\'vision_8870_firmware>>-
cpe:2.3:o:medtronic:n\'vision_8870_firmware:-:*:*:*:*:*:*:*
medtronic
medtronic
>>n\'vision_8870>>-
cpe:2.3:h:medtronic:n\'vision_8870:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-693Primaryics-cert@hq.dhs.gov
CWE-693Secondarynvd@nist.gov
CWE ID: CWE-693
Type: Primary
Source: ics-cert@hq.dhs.gov
CWE ID: CWE-693
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/104213ics-cert@hq.dhs.gov
N/A
https://global.medtronic.com/xg-en/product-security/security-bulletins/nvision.htmlics-cert@hq.dhs.gov
N/A
https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01ics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
https://www.medtronic.com/securityics-cert@hq.dhs.gov
Vendor Advisory
https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://www.medtronic.com/securityaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/104213
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://global.medtronic.com/xg-en/product-security/security-bulletins/nvision.html
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.medtronic.com/security
Source: ics-cert@hq.dhs.gov
Resource:
Vendor Advisory
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.medtronic.com/security
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

9Records found

CVE-2018-8870
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.4||MEDIUM
EPSS-0.08% / 25.21%
||
7 Day CHG~0.00%
Published-02 Jul, 2018 | 18:00
Updated-22 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Medtronic MyCareLink Patient Monitor Use of Hard-coded Password

Medtronic 24950 MyCareLink Monitor and 24952 MyCareLink Monitor contains a hard-coded operating system password. An attacker with physical access can remove the case of the device, connect to the debug port, and use the password to gain privileged access to the operating system.

Action-Not Available
Vendor-medtronicMedtronic
Product-24950_mycarelink_monitor24950_mycarelink_monitor_firmware24952_mycarelink_monitor24952_mycarelink_monitor_firmware24950 MyCareLink Monitor24952 MyCareLink Monitor
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2019-13535
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-4.6||MEDIUM
EPSS-0.45% / 62.67%
||
7 Day CHG~0.00%
Published-08 Nov, 2019 | 19:45
Updated-22 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Medtronic Valleylab FT10 and LS10 Protection Mechanism Failure

In Medtronic Valleylab FT10 Energy Platform (VLFT10GEN) version 2.1.0 and lower and version 2.0.3 and lower, and Valleylab LS10 Energy Platform (VLLS10GEN—not available in the United States) version 1.20.2 and lower, the RFID security mechanism does not apply read protection, allowing for full read access of the RFID security mechanism data.

Action-Not Available
Vendor-medtronicMedtronic
Product-valleylab_ft10_energy_platformvalleylab_ls10_energy_platformvalleylab_ls10_energy_platform_firmwarevalleylab_ft10_energy_platform_firmwareValleylab FT10 Energy Platform (VLFT10GEN)Valleylab LS10 Energy Platform (VLLS10GEN—not available in the United States)
CWE ID-CWE-693
Protection Mechanism Failure
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2022-32537
Matching Score-6
Assigner-Medtronic
ShareView Details
Matching Score-6
Assigner-Medtronic
CVSS Score-4.8||MEDIUM
EPSS-0.05% / 15.56%
||
7 Day CHG~0.00%
Published-17 Nov, 2022 | 20:47
Updated-29 Apr, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Medtronic MiniMed 600 Series Pump System Communication Issue

A vulnerability exists which could allow an unauthorized user to learn aspects of the communication protocol used to pair system components while the pump is being paired with other system components. Exploitation requires nearby wireless signal proximity with the patient and the device; advanced technical knowledge is required for exploitation. Please refer to the Medtronic Product Security Bulletin for guidance

Action-Not Available
Vendor-medtronicMedtronic
Product-guardian_link_2_transmitter_mmt-7738_firmwareminimed_620g_mmt-1750minimed_630g_mmt-1755minimed_670g_mmt-1782_firmwareminimed_640g_mmt-1751_firmwaremmt-1151minimed_630g_mmt-1755_firmwareminimed_630g_mmt-1715_firmwareminimed_670g_mmt-1741mmt-1352guardian_link_2_transmitter_mmt-7730_firmwareminimed_670g_mmt-1761_firmwareminimed_670g_mmt-1760minimed_640g_mmt-1712minimed_640g_mmt-1751minimed_670g_mmt-1741_firmwareminimed_630g_mmt-1754mmt-1352_firmwareguardian_link_3_transmitter_mmt-7811minimed_670g_mmt-1740mmt-1351minimed_670g_mmt-1762_firmwareminimed_670g_mmt-1740_firmwareguardian_link_2_transmitter_mmt-7775minimed_670g_mmt-1780_firmwareminimed_670g_mmt-1782guardian_link_2_transmitter_mmt-7738minimed_670g_mmt-1760_firmwareminimed_640g_mmt-1711_firmwareminimed_670g_mmt-1762mmt-1152_firmwaremmt-1351_firmwareminimed_670g_mmt-1780mmt-1152minimed_640g_mmt-1752_firmwareguardian_link_2_transmitter_mmt-7730guardian_link_2_transmitter_mmt-7775_firmwareminimed_670g_mmt-1761minimed_640g_mmt-1711guardian_link_3_transmitter_mmt-7811_firmwareminimed_670g_mmt-1742minimed_670g_mmt-1781_firmwareminimed_630g_mmt-1715minimed_640g_mmt-1752mmt-1151_firmwareguardian_link_3_transmitter_mmt-7810minimed_640g_mmt-1712_firmwareminimed_670g_mmt-1742_firmwaremmt-7306minimed_620g_mmt-1750_firmwaremmt-7306_firmwareguardian_link_2_transmitter_mmt-7731_firmwareguardian_link_3_transmitter_mmt-7810_firmwareminimed_630g_mmt-1754_firmwareminimed_670g_mmt-1781guardian_link_2_transmitter_mmt-7731Minimed 600 Series Insulin Pump
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2025-8656
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 8.24%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 01:19
Updated-07 Aug, 2025 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kenwood DMX958XR Protection Mechanism Failure Software Downgrade Vulnerability

Kenwood DMX958XR Protection Mechanism Failure Software Downgrade Vulnerability. This vulnerability allows physically present attackers to downgrade software on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the libSystemLib library. The issue results from the lack of proper validation of version information before performing an update. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-26355.

Action-Not Available
Vendor-jvckenwoodKenwood
Product-dmx958xrdmx958xr_firmwareDMX958XR
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2020-7277
Matching Score-4
Assigner-Trellix
ShareView Details
Matching Score-4
Assigner-Trellix
CVSS Score-6.8||MEDIUM
EPSS-0.13% / 32.72%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 11:20
Updated-17 Sep, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
McAfee processes not protected

Protection mechanism failure in all processes in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 April 2020 Update allows local users to stop certain McAfee ENS processes, reducing the protection offered.

Action-Not Available
Vendor-McAfee, LLC
Product-endpoint_securityMcAfee Endpoint Security (ENS)
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2020-3458
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 16.11%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 18:36
Updated-13 Nov, 2024 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities

Multiple vulnerabilities in the secure boot process of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software for the Firepower 1000 Series and Firepower 2100 Series Appliances could allow an authenticated, local attacker to bypass the secure boot mechanism. The vulnerabilities are due to insufficient protections of the secure boot process. An attacker could exploit these vulnerabilities by injecting code into specific files that are then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device, which would be executed at each boot and maintain persistence across reboots.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_1010firepower_2140firepower_1140firepower_2120adaptive_security_appliance_softwarefirepower_2130firepower_1120firepower_1150firepower_2110firepower_threat_defenseCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2018-9314
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 22.98%
||
7 Day CHG~0.00%
Published-31 May, 2018 | 12:00
Updated-05 Aug, 2024 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Head Unit HU_NBT (aka Infotainment) component on BMW i Series, BMW X Series, BMW 3 Series, BMW 5 Series, and BMW 7 Series vehicles produced in 2012 through 2018 allows an attack by an attacker who has direct physical access.

Action-Not Available
Vendor-bmwn/a
Product-head_unit_hu_nbthead_unit_hu_nbt_firmwaren/a
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2022-26774
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.32%
||
7 Day CHG~0.00%
Published-26 May, 2022 | 19:28
Updated-30 May, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.12.4 for Windows. A local attacker may be able to elevate their privileges.

Action-Not Available
Vendor-Apple Inc.
Product-itunesiTunes for Windows
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2017-6261
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-8.2||HIGH
EPSS-0.07% / 20.72%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 13:18
Updated-05 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NVIDIA’s Vibrante Linux version 1.1, 2.0, and 2.2 contains a vulnerability in the user space driver in which protection mechanisms are insufficient, may lead to denial of service or information disclosure

NVIDIA Vibrante Linux version 1.1, 2.0, and 2.2 contains a vulnerability in the user space driver in which protection mechanisms are insufficient, may lead to denial of service or information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-vibrante_linuxNVIDIA Vibrante Linux
CWE ID-CWE-693
Protection Mechanism Failure
CWE ID-CWE-20
Improper Input Validation
Details not found