{"vulnerability": "cve-2018-1063", "sightings": [{"uuid": "939fce76-5300-4a4a-b92b-21a0da9452e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-10631", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19751", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2018-10631\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The 8840 Clinician Programmer executes the application program from the 8870 Application Card. An attacker with physical access to an 8870 Application Card and sufficient technical capability can modify the contents of this card, including the binary executables. If modified to bypass protection mechanisms, this malicious code will be run when the card is inserted into an 8840 Clinician Programmer.\n\ud83d\udccf Published: 2018-07-13T19:00:00Z\n\ud83d\udccf Modified: 2025-06-27T16:19:26.179Z\n\ud83d\udd17 References:\n1. https://global.medtronic.com/xg-en/product-security/security-bulletins/nvision.html\n2. https://www.medtronic.com/security\n3. https://ics-cert.us-cert.gov/advisories/ICSMA-18-137-01\n4. http://www.securityfocus.com/bid/104213", "creation_timestamp": "2025-06-27T16:57:31.000000Z"}, {"uuid": "bba64558-d849-44d5-b83a-8a7ed14d5df5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-10634", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17307", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2018-10634\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Communications between Medtronic MiniMed MMT pumps and wireless accessories are transmitted in cleartext. A sufficiently skilled attacker could capture these transmissions and extract sensitive information, such as device serial numbers.\n\ud83d\udccf Published: 2018-08-13T22:00:00Z\n\ud83d\udccf Modified: 2025-05-22T16:28:03.155Z\n\ud83d\udd17 References:\n1. https://global.medtronic.com/xg-en/product-security/security-bulletins/minimed.html\n2. https://ics-cert.us-cert.gov/advisories/ICSMA-18-219-02\n3. http://www.securityfocus.com/bid/105044", "creation_timestamp": "2025-05-22T16:43:40.000000Z"}, {"uuid": "030a1c60-3fd4-46da-9df0-3fcbfd2a15fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-10632", "type": "seen", "source": "https://t.me/SecLabNews/2734", "content": "\u0418\u043d\u0436\u0435\u043d\u0435\u0440\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Moxa \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438 \u043e\u043f\u0430\u0441\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u0445 Moxa NPort \u0441\u0435\u0440\u0438\u0439 5210, 5230 \u0438 5232. \u041f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2018-10632), \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 SYN-\u043f\u0430\u043a\u0435\u0442\u044b, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u0442 \u043a \u0438\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u044e \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438 \u0441\u0434\u0435\u043b\u0430\u0435\u0442 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u043d\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c.    \n\u0412 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u0445 Moxa NPort \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c", "creation_timestamp": "2018-07-24T12:32:44.000000Z"}]}