Medtronic MiniMed MMT
devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.
Metrics
Affected Vendors & Products
References
History
Thu, 22 May 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolus" options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery. | Medtronic MiniMed MMT devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery. |
Title | Medtronic MiniMed MMT-500/MMT-503 Remote Controllers Authentication Bypass by Capture-replay | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published: 2018-08-13T22:00:00Z
Updated: 2025-05-22T16:33:08.385Z
Reserved: 2018-08-01T00:00:00
Link: CVE-2018-14781

No data.

Status : Modified
Published: 2018-08-13T21:48:01.227
Modified: 2025-05-22T17:15:22.340
Link: CVE-2018-14781

No data.