#VU7599 Memory corruption in Infineon S-Gold 2


Published: 2017-07-31

Vulnerability identifier: #VU7599

Vulnerability risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2017-9633

CWE-ID: CWE-119

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Infineon S-Gold 2
Hardware solutions / Firmware

Vendor: Continental AG

Description
The vulnerability allows an adjacent attacker to execute arbitrary code.

The weakness exists due to boundary error in the temporary mobile subscriber identity (TMSI). An adjacent attacker can trigger memory corruption and execute code on the baseband radio processor of the TCU.

Mitigation
The vulnerability affects the following cars:

  • BMW several models produced between 2009-2010
  • Ford - program to update 2G modems has been active since 2016 and impact is restricted to the limited number of P-HEV vehicles equipped with this older technology that remain in service.
  • Infiniti 2013 JX35
  • Infiniti 2014-2016 QX60
  • Infiniti 2014-2016 QX60 Hybrid
  • Infiniti 2014-2015 QX50
  • Infiniti 2014-2015 QX50 Hybrid
  • Infiniti 2013 M37/M56
  • Infiniti 2014-2016 Q70
  • Infiniti 2014-2016 Q70L
  • Infiniti 2015-2016 Q70 Hybrid
  • Infiniti 2013 QX56
  • Infiniti 2014-2016 QX 80
  • Nissan 2011-2015 Leaf

Continental has validated the reported vulnerabilities but has not yet identified a mitigation plan.

Nissan and Infiniti have issued Technical Service Bulletins (TSB) asking dealers to advise customers of the issue and offer a free 2G TCU deactivation. Nissan/Infiniti’s 2G cellular service provider no longer provides 2G services in the U.S. The subject 2G TCUs are no longer connected to telematics services and no longer perform any function in the affected vehicles. Nissan/Infiniti have stated that this campaign is being performed out of abundance of caution to help safeguard against potential cybersecurity issues.

Nissan/Infiniti proposes that users contact their local Infiniti or Nissan dealers to have the subject 2G TCUs deactivated free of charge.

BMW has validated the vulnerabilities and will be offering a service measure to affected customers.

Ford, since 2016, has had a customer satisfaction program to update or disable legacy 2G modems and there are a limited number of vehicles left on the market. Ford is reviewing the researcher’s findings through internal processes and evaluating the need for any additional steps.

Vulnerable software versions

Infineon S-Gold 2: PMB 8876


External links
http://ics-cert.us-cert.gov/advisories/ICSA-17-208-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability