CVE Details for CVE: CVE-2016-5084
Summary
Johnson & Johnson Animas OneTouch Ping devices do not use encryption for certain data, which might allow remote attackers to obtain sensitive information by sniffing the network.
| Timestamps | |
|---|---|
| Last major update | 24-12-2016 - 02:59 |
| Published | 05-10-2016 - 10:59 |
| Last modified | 24-12-2016 - 02:59 |
References
- https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump
- http://www.kb.cert.org/vuls/id/BLUU-A9SQRS
- http://www.kb.cert.org/vuls/id/884840
- http://www.securityfocus.com/bid/93351
- https://ics-cert.us-cert.gov/advisories/ICSMA-16-279-01
CAPEC
Click the CAPEC title to display a description
-
Signature Spoofing by Key Recreation
An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
CWE
CVSS
Base
5.0
Impact
2.9
Exploitability
10.0
Access
| Vector | Complexity | Authentication |
|---|---|---|
| NETWORK | LOW | NONE |
Impact
| Confidentiality | Integrity | Availability |
|---|---|---|
| PARTIAL | NONE | NONE |
CVSS3
Base
7.5
Impact
3.6
Exploitability
3.9
Access
| Attack Complexity | Attack vector | Privileges Required | Scope | User Interaction |
|---|---|---|---|---|
| LOW | NETWORK | NONE | UNCHANGED | NONE |
Impact
| Confidentiality | Integrity | Availability |
|---|---|---|
| HIGH | NONE | NONE |