CVE-2022-41627

The physical IoT device of the AliveCor's KardiaMobile, a smartphone-based personal electrocardiogram (EKG) has no encryption for its data-over-sound protocols. Exploiting this vulnerability could allow an attacker to read patient EKG results or create a denial-of-service condition by emitting sounds at similar frequencies as the device, disrupting the smartphone microphone’s ability to accurately read the data. To carry out this attack, the attacker must be close (less than 5 feet) to pick up and emit sound waves.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsma-22-298-01 Third Party Advisory US Government Resource
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:alivecor:kardiamobile_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:alivecor:kardiamobile:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:alivecor:kardiamobile_6l_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:alivecor:kardiamobile_6l:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:alivecor:kardiamobile_card_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:alivecor:kardiamobile_card:-:*:*:*:*:*:*:*

Information

Published : 2022-10-27 14:15

Updated : 2022-11-02 10:21


NVD link : CVE-2022-41627

Mitre link : CVE-2022-41627


JSON object : View

CWE
CWE-311

Missing Encryption of Sensitive Data

Advertisement

dedicated server usa

Products Affected

alivecor

  • kardiamobile
  • kardiamobile_6l
  • kardiamobile_card
  • kardiamobile_6l_firmware
  • kardiamobile_firmware
  • kardiamobile_card_firmware