Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 07 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Medtronic
Medtronic mycarelink Monitor 24950 Medtronic mycarelink Monitor 24952 |
|
| Vendors & Products |
Medtronic
Medtronic mycarelink Monitor 24950 Medtronic mycarelink Monitor 24952 |
Thu, 07 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Medtronic MyCareLink Patient Monitor uses per-product credentials that are stored in a recoverable format. An attacker can use these credentials to modify encrypted drive data. | |
| Title | Medtronic MyCareLink Patient Monitor Data Encryption Weakness | |
| Weaknesses | CWE-313 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Medtronic
Published:
Updated: 2026-05-07T15:45:18.202Z
Reserved: 2025-05-06T20:24:40.064Z
Link: CVE-2025-4397
Updated: 2026-05-07T15:45:10.324Z
Status : Awaiting Analysis
Published: 2026-05-07T16:16:17.410
Modified: 2026-05-07T18:46:47.697
Link: CVE-2025-4397
No data.
OpenCVE Enrichment
Updated: 2026-05-07T18:00:11Z