CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
EPSS
Percentile
18.0%
The physical IoT device of the AliveCorβs KardiaMobile, a smartphone-based personal electrocardiogram (EKG) has no encryption for its data-over-sound protocols. Exploiting this vulnerability could allow an attacker to read patient EKG results or create a denial-of-service condition by emitting sounds at similar frequencies as the device, disrupting the smartphone microphoneβs ability to accurately read the data. To carry out this attack, the attacker must be close (less than 5 feet) to pick up and emit sound waves.
Vendor | Product | Version | CPE |
---|---|---|---|
alivecor | kardiamobile | - | cpe:2.3:h:alivecor:kardiamobile:-:*:*:*:*:*:*:* |
alivecor | kardiamobile_firmware | - | cpe:2.3:o:alivecor:kardiamobile_firmware:-:*:*:*:*:*:*:* |
alivecor | kardiamobile_6l | - | cpe:2.3:h:alivecor:kardiamobile_6l:-:*:*:*:*:*:*:* |
alivecor | kardiamobile_6l_firmware | - | cpe:2.3:o:alivecor:kardiamobile_6l_firmware:-:*:*:*:*:*:*:* |
alivecor | kardiamobile_card | - | cpe:2.3:h:alivecor:kardiamobile_card:-:*:*:*:*:*:*:* |
alivecor | kardiamobile_card_firmware | - | cpe:2.3:o:alivecor:kardiamobile_card_firmware:-:*:*:*:*:*:*:* |