Skip to main content

Medtronic ValleyLab Generator Authentication Vulnerabilities

Medtronic has released details of several authentication vulnerabilities affecting their ValleyLab electrosurgical platform.

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Medtronic has released details of several authentication vulnerabilities affecting their ValleyLab electrosurgical platform.


Threat details

An unauthenticated user on the same local network could exploit these vulnerabilities to gain control of an affected system. The vulnerabilities affect several disparate functions within the ValleyLab platform, and are listed below:

  • CVE-2019-3463 & CVE-2019-3464 - The affected platforms use a vulnerable version of the rssh utility. An attacker could exploit this to upload arbitrary files to an affected device.
  • CVE-2019-13531 - The RFID instrument authentication function can be bypassed. An attacker could exploit this to connect inauthentic instruments to an affected device.
  • CVE-2019-13535 - The RFID instrument authentication function does not apply sufficient access protection. An attacker could exploit this to gain full access to RFID security data.
  • CVE-2019-13539 - The affected platforms use the descrypt algorithm for password hashing, which disables network-based access when operating. An attacker could exploit other vulnerabilities on this list during this process to obtain local access.
  • CVE-2019-13543 - The affected platforms use a series of hard-coded credentials. An attacker could exploit several of the above vulnerabilities to access these, at which point they could gain full control of an affected device.

For further information:


Remediation steps

Type Step

Medtronic have confirmed that updates to address these vulnerabilities will be made available in the coming months. Affected organisations are encouraged to contact Medtronic or their relevant suppliers to acquire and apply these patches.



CVE Vulnerabilities

Last edited: 14 February 2020 2:57 pm