Security bulletins
MyCareLink™ patient monitor vulnerabilities
Get information about security vulnerabilities related to the MyCareLink™ patient monitor.
Updated: May 7, 2026
Medtronic has released the final security updates to address the vulnerabilities in the devices listed below. Please note that this updated bulletin is not related to the unauthorized system access event that Medtronic disclosed in the following statement: https://news.medtronic.com/Medtronic-statement-on-unauthorized-system-access.
The complete updated advisory issued by CISA can be found here.
See the References section below to see the updated CVEs.
Originally published: July 24, 2025
An external security researcher identified vulnerabilities related to the MyCareLink™ patient monitor. These vulnerabilities relate to specific functions and interfaces associated with the MyCareLink™ patient monitor Models 24950 and 24952.
The MyCareLink™ patient monitor is a part of the remote monitoring system for patients with Medtronic implantable cardiac devices. This system enables patients to securely transmit their cardiac device data to the Medtronic CareLink™ network. Clinicians can then access the transmitted data, supporting timely review and management of the patient’s cardiac health.
Exploitation of this vulnerability would not cause direct patient harm, but could potentially lead to system compromise, unauthorized access to sensitive data, and manipulation of the monitor’s functionality.
Medtronic has not observed malicious exploitation related to these vulnerabilities.
Products impacted
The identified vulnerabilities were reported as low-risk findings. An attacker would need to physically tamper with the monitor to exploit them. In response, starting in June 2025, Medtronic began deploying security updates to address these findings.
Customers needing additional information should contact security@medtronic.com.
For U.S. customers and patients only: Reach out to Medtronic Stay Connected at 800-929-4043, available Monday through Friday 7:00 AM to 7:00 PM Central Time.
CVE-2025-4393
CVE-2025-4394
CVE-2025-4395
CVE-2018-10622
CVE-2025-4386
CVE-2025-4397
Cybersecurity and Infrastructure Security Agency (CISA) has published a corresponding security advisory related to this disclosure.
We want to acknowledge the efforts of security researchers Ethan Morchy from Somerset Recon and Carl Mann, an independent researcher, in collaborating with Medtronic through the Coordinated Vulnerability Disclosure process.