{"vulnerability": "CVE-2020-25183", "sightings": [{"uuid": "f990a761-e450-42f5-b792-b705bff101b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25183", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17342", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-25183\n\ud83d\udd25 CVSS Score: 8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Medtronic MyCareLink Smart 25000 contains \n\nan authentication protocol vulnerability where the method used to authenticate between the MCL Smart Patient Reader and the Medtronic MyCareLink Smart mobile app is vulnerable to bypass. This vulnerability enables an attacker to use another mobile device or malicious application on the patient\u2019s smartphone to authenticate to the patient\u2019s Medtronic Smart Reader, fooling the device into believing it is communicating with the original Medtronic smart phone application when executed within range of Bluetooth communication.\n\ud83d\udccf Published: 2020-12-14T19:18:44\n\ud83d\udccf Modified: 2025-05-22T19:34:29.069Z\n\ud83d\udd17 References:\n1. https://global.medtronic.com/xg-en/product-security/security-bulletins/mycarelink-smart-security-vulnerability-patch.html\n2. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-20-345-01", "creation_timestamp": "2025-05-22T19:45:46.000000Z"}, {"uuid": "6cbb2536-8aa8-4530-b3c4-f54483fed15e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25183", "type": "seen", "source": "https://t.me/cibsecurity/20763", "content": "\u203c CVE-2020-25183 \u203c\n\nMedtronic MyCareLink Smart 25000 all versions contain an authentication protocol vuln where the method used to auth between MCL Smart Patient Reader and MyCareLink Smart mobile app is vulnerable to bypass. This vuln allows attacker to use other mobile device or malicious app on smartphone to auth to the patient\u00e2\u20ac\u2122s Smart Reader, fools the device into thinking its communicating with the actual smart phone application when executed in range of Bluetooth.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-14T22:39:19.000000Z"}]}