Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-25931", "assignerOrgId": "3c337f33-b2bd-4529-9792-f48cdb2838b4", "state": "PUBLISHED", "assignerShortName": "Medtronic", "dateReserved": "2023-02-16T17:24:51.595Z", "datePublished": "2023-03-01T18:56:30.093Z", "dateUpdated": "2025-03-07T21:34:37.484Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "InsterStim Applications", "vendor": "Medtronic", "versions": [{"lessThan": "A51200", "status": "affected", "version": "Micro Clinician ", "versionType": "custom"}, {"lessThan": "A51300", "status": "affected", "version": "InterStim X Clinician", "versionType": "custom"}]}], "datePublic": "2023-03-02T20:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Medtronic identified that the Pelvic Health clinician apps, which are installed on the Smart Programmer mobile device, have a password vulnerability that requires a security update to fix. Not updating could potentially result in unauthorized control of the clinician therapy application, which has greater control over therapy parameters than the patient app. Changes still cannot be made outside of the established therapy parameters of the programmer. For unauthorized access to occur, an individual would need physical access to the Smart Programmer. <br><br>"}], "value": "Medtronic identified that the Pelvic Health clinician apps, which are installed on the Smart Programmer mobile device, have a password vulnerability that requires a security update to fix. Not updating could potentially result in unauthorized control of the clinician therapy application, which has greater control over therapy parameters than the patient app. Changes still cannot be made outside of the established therapy parameters of the programmer. For unauthorized access to occur, an individual would need physical access to the Smart Programmer. \n\n"}], "exploits": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "No known exploits. "}], "value": "No known exploits.\u00a0"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-620", "description": "CWE-620: Unverified Password Change", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "3c337f33-b2bd-4529-9792-f48cdb2838b4", "shortName": "Medtronic", "dateUpdated": "2023-03-01T18:56:30.093Z"}, "references": [{"url": "https://global.medtronic.com/xg-en/product-security/security-bulletins/pelvic-health-interstim-micro.html"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Current versions of the application has mitigated this vulnerability. Please refer to the Medtronic Security Bulletin for update guidance. <br><br>"}], "value": "Current versions of the application has mitigated this vulnerability. Please refer to the Medtronic Security Bulletin for update guidance.\u00a0\n\n"}], "source": {"discovery": "INTERNAL"}, "title": "Medtronic Micro Clinician & InterStim X Clinician App Password Reset Issue", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T11:39:05.335Z"}, "title": "CVE Program Container", "references": [{"url": "https://global.medtronic.com/xg-en/product-security/security-bulletins/pelvic-health-interstim-micro.html", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-03-07T21:34:21.835531Z", "id": "CVE-2023-25931", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-03-07T21:34:37.484Z"}}]}}