Two vulnerabilities in Continental AG Infineon S-Gold 2



Risk Low
Patch available NO
Number of vulnerabilities 2
CVE-ID CVE-2017-9647
CVE-2017-9633
CWE-ID CWE-121
CWE-119
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
Infineon S-Gold 2
Hardware solutions / Firmware

Vendor Continental AG

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Stack-based buffer overflow

EUVDB-ID: #VU7598

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2017-9647

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a local attacker to execute arbitrary code.

The weakness exists due to stack-based buffer overflow in the processing of AT commands. A local attacker with a physical connection to the TCU can trigger memory corruption and crash or execute code on the baseband radio processor of the TCU.

Mitigation

The vulnerability affects the following cars:

  • BMW several models produced between 2009-2010
  • Ford - program to update 2G modems has been active since 2016 and impact is restricted to the limited number of P-HEV vehicles equipped with this older technology that remain in service.
  • Infiniti 2013 JX35
  • Infiniti 2014-2016 QX60
  • Infiniti 2014-2016 QX60 Hybrid
  • Infiniti 2014-2015 QX50
  • Infiniti 2014-2015 QX50 Hybrid
  • Infiniti 2013 M37/M56
  • Infiniti 2014-2016 Q70
  • Infiniti 2014-2016 Q70L
  • Infiniti 2015-2016 Q70 Hybrid
  • Infiniti 2013 QX56
  • Infiniti 2014-2016 QX 80
  • Nissan 2011-2015 Leaf

Continental has validated the reported vulnerabilities but has not yet identified a mitigation plan.

Nissan and Infiniti have issued Technical Service Bulletins (TSB) asking dealers to advise customers of the issue and offer a free 2G TCU deactivation. Nissan/Infiniti’s 2G cellular service provider no longer provides 2G services in the U.S. The subject 2G TCUs are no longer connected to telematics services and no longer perform any function in the affected vehicles. Nissan/Infiniti have stated that this campaign is being performed out of abundance of caution to help safeguard against potential cybersecurity issues.

Nissan/Infiniti proposes that users contact their local Infiniti or Nissan dealers to have the subject 2G TCUs deactivated free of charge.

BMW has validated the vulnerabilities and will be offering a service measure to affected customers.

Ford, since 2016, has had a customer satisfaction program to update or disable legacy 2G modems and there are a limited number of vehicles left on the market. Ford is reviewing the researcher’s findings through internal processes and evaluating the need for any additional steps.

Vulnerable software versions

Infineon S-Gold 2: PMB 8876

CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/ICSA-17-208-01


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory corruption

EUVDB-ID: #VU7599

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2017-9633

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to execute arbitrary code.

The weakness exists due to boundary error in the temporary mobile subscriber identity (TMSI). An adjacent attacker can trigger memory corruption and execute code on the baseband radio processor of the TCU.

Mitigation

The vulnerability affects the following cars:

  • BMW several models produced between 2009-2010
  • Ford - program to update 2G modems has been active since 2016 and impact is restricted to the limited number of P-HEV vehicles equipped with this older technology that remain in service.
  • Infiniti 2013 JX35
  • Infiniti 2014-2016 QX60
  • Infiniti 2014-2016 QX60 Hybrid
  • Infiniti 2014-2015 QX50
  • Infiniti 2014-2015 QX50 Hybrid
  • Infiniti 2013 M37/M56
  • Infiniti 2014-2016 Q70
  • Infiniti 2014-2016 Q70L
  • Infiniti 2015-2016 Q70 Hybrid
  • Infiniti 2013 QX56
  • Infiniti 2014-2016 QX 80
  • Nissan 2011-2015 Leaf

Continental has validated the reported vulnerabilities but has not yet identified a mitigation plan.

Nissan and Infiniti have issued Technical Service Bulletins (TSB) asking dealers to advise customers of the issue and offer a free 2G TCU deactivation. Nissan/Infiniti’s 2G cellular service provider no longer provides 2G services in the U.S. The subject 2G TCUs are no longer connected to telematics services and no longer perform any function in the affected vehicles. Nissan/Infiniti have stated that this campaign is being performed out of abundance of caution to help safeguard against potential cybersecurity issues.

Nissan/Infiniti proposes that users contact their local Infiniti or Nissan dealers to have the subject 2G TCUs deactivated free of charge.

BMW has validated the vulnerabilities and will be offering a service measure to affected customers.

Ford, since 2016, has had a customer satisfaction program to update or disable legacy 2G modems and there are a limited number of vehicles left on the market. Ford is reviewing the researcher’s findings through internal processes and evaluating the need for any additional steps.

Vulnerable software versions

Infineon S-Gold 2: PMB 8876

CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/ICSA-17-208-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###