ID

VAR-201610-0161


CVE

CVE-2016-5085


TITLE

Animas OneTouch Ping insulin pump contains multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#884840

DESCRIPTION

Johnson & Johnson Animas OneTouch Ping devices do not properly generate random numbers, which makes it easier for remote attackers to spoof meters by sniffing the network and then engaging in an authentication handshake. The Animas OneTouch Ping insulin pump contains multiple vulnerabilities that may allow an unauthenticated remote attacker to obtain patient treatment or device data, or execute commands on the device. The attacker cannot obtain personally identifiable information. Supplementary information : CWE Vulnerability type by CWE-330: Use of Insufficiently Random Values ( Insufficient random value used ) Has been identified. http://cwe.mitre.org/data/definitions/330.htmlA third party can intercept your network and then perform an authentication handshake to impersonate your meter. Animas OneTouch Ping is prone to the following security vulnerabilities: 1. An information-disclosure vulnerability 2. Multiple security-bypass vulnerabilities 3. A Spoofing vulnerability An attacker can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, and perform certain unauthorized actions and to insert and display spoofed content. Other attacks are also possible. Animas OneTouch Ping is a medical self-service device for diabetic patients taking insulin from Animas Company of the United States. A remote attacker could exploit this vulnerability by sniffing the network to forge data

Trust: 2.7

sources: NVD: CVE-2016-5085 // CERT/CC: VU#884840 // JVNDB: JVNDB-2016-005121 // BID: 93351 // VULHUB: VHN-93904

AFFECTED PRODUCTS

vendor:animasmodel:onetouch pingscope: - version: -

Trust: 1.6

vendor:animasmodel:onetouch pingscope:eqversion: -

Trust: 1.6

vendor:johnson johnsonmodel: - scope: - version: -

Trust: 0.8

vendor:animasmodel:onetouch pingscope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#884840 // BID: 93351 // JVNDB: JVNDB-2016-005121 // CNNVD: CNNVD-201610-006 // NVD: CVE-2016-5085

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5085
value: HIGH

Trust: 1.0

NVD: CVE-2016-5085
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201610-006
value: HIGH

Trust: 0.6

VULHUB: VHN-93904
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-5085
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-93904
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5085
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-93904 // JVNDB: JVNDB-2016-005121 // CNNVD: CNNVD-201610-006 // NVD: CVE-2016-5085

PROBLEMTYPE DATA

problemtype:CWE-330

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-93904 // JVNDB: JVNDB-2016-005121 // NVD: CVE-2016-5085

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-006

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201610-006

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005121

PATCH

title:OneTouch Ping Glucose Management Systemurl:https://www.animas.com/diabetes-insulin-pump-and-bloog-glucose-meter/onetouch-ping-blood-glucose-monitor

Trust: 0.8

title:Important Information about the cybersecurity of your OneTouch Ping Insulin Infusion Pumpurl:https://www.animas.com/sites/default/files/pdf/FINAL%20Letter%20to%20patients%20regarding%20OTP_10.04.16.16_WEB%20VERSION.PDF

Trust: 0.8

sources: JVNDB: JVNDB-2016-005121

EXTERNAL IDS

db:CERT/CCid:VU#884840

Trust: 3.6

db:NVDid:CVE-2016-5085

Trust: 2.8

db:ICS CERTid:ICSMA-16-279-01

Trust: 2.2

db:BIDid:93351

Trust: 1.4

db:JVNid:JVNVU95089754

Trust: 0.8

db:JVNDBid:JVNDB-2016-005121

Trust: 0.8

db:CNNVDid:CNNVD-201610-006

Trust: 0.7

db:NSFOCUSid:34992

Trust: 0.6

db:VULHUBid:VHN-93904

Trust: 0.1

sources: CERT/CC: VU#884840 // VULHUB: VHN-93904 // BID: 93351 // JVNDB: JVNDB-2016-005121 // CNNVD: CNNVD-201610-006 // NVD: CVE-2016-5085

REFERENCES

url:https://community.rapid7.com/community/infosec/blog/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump

Trust: 3.6

url:http://www.kb.cert.org/vuls/id/884840

Trust: 2.8

url:https://ics-cert.us-cert.gov/advisories/icsma-16-279-01

Trust: 2.2

url:http://www.kb.cert.org/vuls/id/bluu-a9sqrs

Trust: 1.7

url:http://www.securityfocus.com/bid/93351

Trust: 1.1

url:https://www.animas.com/our-pumps/one-touch-ping

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5085

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95089754/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5085

Trust: 0.8

url:http://www.nsfocus.net/vulndb/34992

Trust: 0.6

url:https://www.animas.com/diabetes-insulin-pump-and-bloog-glucose-meter/onetouch-ping-blood-glucose-monitor

Trust: 0.3

sources: CERT/CC: VU#884840 // VULHUB: VHN-93904 // BID: 93351 // JVNDB: JVNDB-2016-005121 // CNNVD: CNNVD-201610-006 // NVD: CVE-2016-5085

CREDITS

Tod Beardsley of Rapid7.

Trust: 0.3

sources: BID: 93351

SOURCES

db:CERT/CCid:VU#884840
db:VULHUBid:VHN-93904
db:BIDid:93351
db:JVNDBid:JVNDB-2016-005121
db:CNNVDid:CNNVD-201610-006
db:NVDid:CVE-2016-5085

LAST UPDATE DATE

2025-04-13T23:17:51.175000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#884840date:2016-10-11T00:00:00
db:VULHUBid:VHN-93904date:2016-12-24T00:00:00
db:BIDid:93351date:2016-10-10T05:02:00
db:JVNDBid:JVNDB-2016-005121date:2016-10-11T00:00:00
db:CNNVDid:CNNVD-201610-006date:2016-10-09T00:00:00
db:NVDid:CVE-2016-5085date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#884840date:2016-10-04T00:00:00
db:VULHUBid:VHN-93904date:2016-10-05T00:00:00
db:BIDid:93351date:2016-10-04T00:00:00
db:JVNDBid:JVNDB-2016-005121date:2016-10-11T00:00:00
db:CNNVDid:CNNVD-201610-006date:2016-10-09T00:00:00
db:NVDid:CVE-2016-5085date:2016-10-05T10:59:11.643