Johnson & Johnson Animas OneTouch Ping devices do not properly generate random numbers, which makes it easier for remote attackers to spoof meters by sniffing the network and then engaging in an authentication handshake.
References
Link | Resource |
---|---|
https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump | Mitigation Technical Description Third Party Advisory |
http://www.kb.cert.org/vuls/id/BLUU-A9SQRS | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/884840 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/93351 | |
https://ics-cert.us-cert.gov/advisories/ICSMA-16-279-01 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2016-10-05 03:59
Updated : 2016-12-23 18:59
NVD link : CVE-2016-5085
Mitre link : CVE-2016-5085
JSON object : View
CWE
CWE-330
Use of Insufficiently Random Values
Products Affected
animas
- onetouch_ping
- onetouch_ping_firmware