CVE-2016-5686

Johnson & Johnson Animas OneTouch Ping devices mishandle acknowledgements, which makes it easier for remote attackers to bypass authentication via a custom communication protocol.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:animas:onetouch_ping_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:animas:onetouch_ping:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/884840 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/884840 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/BLUU-A9SQRS - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/BLUU-A9SQRS - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/93351 - () http://www.securityfocus.com/bid/93351 -
References () https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump - Mitigation, Technical Description, Third Party Advisory () https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump - Mitigation, Technical Description, Third Party Advisory

Information

Published : 2016-10-05 10:59

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5686

Mitre link : CVE-2016-5686

CVE.ORG link : CVE-2016-5686


JSON object : View

Products Affected

animas

  • onetouch_ping
  • onetouch_ping_firmware
CWE
CWE-287

Improper Authentication