{"vulnerability": "CVE-2020-2518", "sightings": [{"uuid": "f990a761-e450-42f5-b792-b705bff101b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25183", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17342", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-25183\n\ud83d\udd25 CVSS Score: 8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Medtronic MyCareLink Smart 25000 contains \n\nan authentication protocol vulnerability where the method used to authenticate between the MCL Smart Patient Reader and the Medtronic MyCareLink Smart mobile app is vulnerable to bypass. This vulnerability enables an attacker to use another mobile device or malicious application on the patient\u2019s smartphone to authenticate to the patient\u2019s Medtronic Smart Reader, fooling the device into believing it is communicating with the original Medtronic smart phone application when executed within range of Bluetooth communication.\n\ud83d\udccf Published: 2020-12-14T19:18:44\n\ud83d\udccf Modified: 2025-05-22T19:34:29.069Z\n\ud83d\udd17 References:\n1. https://global.medtronic.com/xg-en/product-security/security-bulletins/mycarelink-smart-security-vulnerability-patch.html\n2. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-20-345-01", "creation_timestamp": "2025-05-22T19:45:46.000000Z"}, {"uuid": "e3d0e067-34fe-4cee-bb2a-35c0aa7f18f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-25180", "type": "seen", "source": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1771.html", "content": "", "creation_timestamp": "2026-03-10T04:00:00.000000Z"}, {"uuid": "8744ea78-d547-4352-a4c4-38d688c4b4f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-25182", "type": "seen", "source": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1771.html", "content": "", "creation_timestamp": "2026-03-10T04:00:00.000000Z"}, {"uuid": "cb20dc41-72ac-44cc-9800-abf00746cb74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-25184", "type": "seen", "source": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1771.html", "content": "", "creation_timestamp": "2026-03-10T04:00:00.000000Z"}, {"uuid": "147d362d-bbe5-48e6-b3bb-225cd2e1f12d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25182", "type": "seen", "source": "https://t.me/cibsecurity/39259", "content": "\u203c CVE-2020-25182 \u203c\n\nRockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-18T21:33:45.000000Z"}, {"uuid": "4e0f6060-8689-40bd-83a5-fa3ffdd0fdf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25187", "type": "seen", "source": "https://t.me/cibsecurity/20766", "content": "\u203c CVE-2020-25187 \u203c\n\nMedtronic MyCareLink Smart 25000 all versions are vulnerable when an attacker who gains auth runs a debug command, which is sent to the reader causing heap overflow in the MCL Smart Reader stack. A heap overflow allows attacker to remotely execute code on the MCL Smart Reader, could lead to control of device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-14T22:39:25.000000Z"}, {"uuid": "4a6e76ae-2082-4cd6-a32c-27ec7b6ee094", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25181", "type": "seen", "source": "https://t.me/cibsecurity/16988", "content": "\u203c CVE-2020-25181 \u203c\n\nWECON PLC Editor Versions 1.3.8 and prior has a heap-based buffer overflow vulnerabilities have been identified that may allow arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-01T18:54:11.000000Z"}, {"uuid": "6cbb2536-8aa8-4530-b3c4-f54483fed15e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25183", "type": "seen", "source": "https://t.me/cibsecurity/20763", "content": "\u203c CVE-2020-25183 \u203c\n\nMedtronic MyCareLink Smart 25000 all versions contain an authentication protocol vuln where the method used to auth between MCL Smart Patient Reader and MyCareLink Smart mobile app is vulnerable to bypass. This vuln allows attacker to use other mobile device or malicious app on smartphone to auth to the patient\u00e2\u20ac\u2122s Smart Reader, fools the device into thinking its communicating with the actual smart phone application when executed in range of Bluetooth.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-14T22:39:19.000000Z"}, {"uuid": "946cf715-989e-454f-b968-226ac2755aaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25185", "type": "seen", "source": "https://t.me/cibsecurity/16684", "content": "\u203c CVE-2020-25185 \u203c\n\nThe affected product is vulnerable to five post-authentication buffer overflows, which may allow a logged in user to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-21T12:43:39.000000Z"}]}