Vulnerability Details CVE-2019-18256
BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.5%
CVSS Severity
CVSS v3 Score 4.6
CVSS v2 Score 2.1
Products affected by CVE-2019-18256
-
cpe:2.3:h:biotronik:cardiomessenger_ii-s_gsm:-
-
cpe:2.3:h:biotronik:cardiomessenger_ii-s_t-line:-
-
cpe:2.3:o:biotronik:cardiomessenger_ii-s_gsm_firmware:2.20
-
cpe:2.3:o:biotronik:cardiomessenger_ii-s_t-line_firmware:2.20