#VU7598 Stack-based buffer overflow in Infineon S-Gold 2


Published: 2017-07-31

Vulnerability identifier: #VU7598

Vulnerability risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2017-9647

CWE-ID: CWE-121

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Infineon S-Gold 2
Hardware solutions / Firmware

Vendor: Continental AG

Description
The vulnerability allows a local attacker to execute arbitrary code.

The weakness exists due to stack-based buffer overflow in the processing of AT commands. A local attacker with a physical connection to the TCU can trigger memory corruption and crash or execute code on the baseband radio processor of the TCU.

Mitigation
The vulnerability affects the following cars:

  • BMW several models produced between 2009-2010
  • Ford - program to update 2G modems has been active since 2016 and impact is restricted to the limited number of P-HEV vehicles equipped with this older technology that remain in service.
  • Infiniti 2013 JX35
  • Infiniti 2014-2016 QX60
  • Infiniti 2014-2016 QX60 Hybrid
  • Infiniti 2014-2015 QX50
  • Infiniti 2014-2015 QX50 Hybrid
  • Infiniti 2013 M37/M56
  • Infiniti 2014-2016 Q70
  • Infiniti 2014-2016 Q70L
  • Infiniti 2015-2016 Q70 Hybrid
  • Infiniti 2013 QX56
  • Infiniti 2014-2016 QX 80
  • Nissan 2011-2015 Leaf

Continental has validated the reported vulnerabilities but has not yet identified a mitigation plan.

Nissan and Infiniti have issued Technical Service Bulletins (TSB) asking dealers to advise customers of the issue and offer a free 2G TCU deactivation. Nissan/Infiniti’s 2G cellular service provider no longer provides 2G services in the U.S. The subject 2G TCUs are no longer connected to telematics services and no longer perform any function in the affected vehicles. Nissan/Infiniti have stated that this campaign is being performed out of abundance of caution to help safeguard against potential cybersecurity issues.

Nissan/Infiniti proposes that users contact their local Infiniti or Nissan dealers to have the subject 2G TCUs deactivated free of charge.

BMW has validated the vulnerabilities and will be offering a service measure to affected customers.

Ford, since 2016, has had a customer satisfaction program to update or disable legacy 2G modems and there are a limited number of vehicles left on the market. Ford is reviewing the researcher’s findings through internal processes and evaluating the need for any additional steps.

Vulnerable software versions

Infineon S-Gold 2: PMB 8876


External links
http://ics-cert.us-cert.gov/advisories/ICSA-17-208-01


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability