Vulnerability identifier: #VU7598
Vulnerability risk: Low
CVSSv3.1: 6.1 [CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-121
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Infineon S-Gold 2
Hardware solutions /
Firmware
Vendor: Continental AG
Description
The vulnerability allows a local attacker to execute arbitrary code.
The weakness exists due to stack-based buffer overflow in the processing of AT commands. A local attacker with a physical connection to the TCU can trigger memory corruption and crash or execute code on the baseband radio processor of the TCU.
Mitigation
The vulnerability affects the following cars:
Continental has validated the reported vulnerabilities but has not yet identified a mitigation plan.
Nissan and Infiniti have issued Technical Service Bulletins (TSB) asking dealers to advise customers of the issue and offer a free 2G TCU deactivation. Nissan/Infiniti’s 2G cellular service provider no longer provides 2G services in the U.S. The subject 2G TCUs are no longer connected to telematics services and no longer perform any function in the affected vehicles. Nissan/Infiniti have stated that this campaign is being performed out of abundance of caution to help safeguard against potential cybersecurity issues.
Nissan/Infiniti proposes that users contact their local Infiniti or Nissan dealers to have the subject 2G TCUs deactivated free of charge.
BMW has validated the vulnerabilities and will be offering a service measure to affected customers.
Ford, since 2016, has had a customer satisfaction program to update or disable legacy 2G modems and there are a limited number of vehicles left on the market. Ford is reviewing the researcher’s findings through internal processes and evaluating the need for any additional steps.
Vulnerable software versions
Infineon S-Gold 2: PMB 8876
External links
http://ics-cert.us-cert.gov/advisories/ICSA-17-208-01
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.