The physical IoT device of the AliveCor's KardiaMobile, a smartphone-based personal electrocardiogram (EKG) has no encryption for its data-over-sound protocols. Exploiting this vulnerability could allow an attacker to read patient EKG results or create a denial-of-service condition by emitting sounds at similar frequencies as the device, disrupting the smartphone microphone’s ability to accurately read the data. To carry out this attack, the attacker must be close (less than 5 feet) to pick up and emit sound waves.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsma-22-298-01 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsma-22-298-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2022-10-27 21:15
Updated : 2024-11-21 07:23
NVD link : CVE-2022-41627
Mitre link : CVE-2022-41627
CVE.ORG link : CVE-2022-41627
JSON object : View
Products Affected
alivecor
- kardiamobile
- kardiamobile_6l
- kardiamobile_card_firmware
- kardiamobile_firmware
- kardiamobile_card
- kardiamobile_6l_firmware