Description
Johnson & Johnson Animas OneTouch Ping devices do not properly generate random numbers, which makes it easier for remote attackers to spoof meters by sniffing the network and then engaging in an authentication handshake.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-6038 | Johnson & Johnson Animas OneTouch Ping devices do not properly generate random numbers, which makes it easier for remote attackers to spoof meters by sniffing the network and then engaging in an authentication handshake. |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T00:53:47.380Z
Reserved: 2016-05-26T00:00:00.000Z
Link: CVE-2016-5085
No data.
Status : Modified
Published: 2016-10-05T10:59:11.643
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-5085
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD