The physical IoT device of the AliveCor's KardiaMobile, a smartphone-based personal electrocardiogram (EKG) has no encryption for its data-over-sound protocols. Exploiting this vulnerability could allow an attacker to read patient EKG results or create a denial-of-service condition by emitting sounds at similar frequencies as the device, disrupting the smartphone microphone’s ability to accurately read the data. To carry out this attack, the attacker must be close (less than 5 feet) to pick up and emit sound waves.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsma-22-298-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2022-10-27 14:15
Updated : 2022-11-02 10:21
NVD link : CVE-2022-41627
Mitre link : CVE-2022-41627
JSON object : View
CWE
CWE-311
Missing Encryption of Sensitive Data
Products Affected
alivecor
- kardiamobile
- kardiamobile_6l
- kardiamobile_card
- kardiamobile_6l_firmware
- kardiamobile_firmware
- kardiamobile_card_firmware