CVE-2025-4397 is a medium-severity issue in Medtronic’s MyCareLink Patient Monitor. CISA says the device stores per-product credentials in a recoverable format, which could let an attacker who physically tampers with the monitor modify encrypted drive data. The advisory was first published on 2025-07-24 and later revised as Update A on 2026-05-07.
CVE-2025-4395 affects Medtronic MyCareLink Patient Monitor models 24950 and 24952 and is rated CVSS 6.8 (Medium). The issue is a built-in user account with an empty password, which means a person with physical access to the monitor can log in without credentials and access or modify system functionality. CISA published the advisory on 2025-07-24 and later issued Update A on 2026-05-07. Medtronic character [truncated]
CVE-2025-4394 describes an unencrypted filesystem on internal storage in Medtronic MyCareLink Patient Monitor devices. CISA says an attacker would need physical access to tamper with the monitor to read or modify files, and Medtronic reported the issue as a low-risk finding while deploying security updates beginning in June 2025.
CVE-2025-4393 affects Medtronic MyCareLink Patient Monitor model 24950 and 24952. CISA says an internal service deserializes data, and a local attacker who can physically tamper with the monitor may craft a binary payload that can crash the service or elevate privileges. Medtronic says it began deploying security updates in June 2025, with automatic update delivery when the monitor is connected to the internet.
CVE-2025-4386 is a physical-access issue in Medtronic MyCareLink Patient Monitor models 24950 and 24952. CISA says an attacker with physical access can reach a login prompt through an internal UART terminal. The advisory rates the issue as a medium-severity finding (CVSS 6.8) and notes Medtronic began deploying security updates in June 2025.
CVE-2018-10622 describes a weakness in Medtronic MyCareLink Patient Monitor models 24950 and 24952 where per-product credentials are stored in a recoverable format. CISA says an attacker could use those credentials for network authentication. The advisory characterizes the issue as a low-risk finding and notes that physical tampering with the monitor would be needed to exploit it. Medtronic began deployin [truncated]