漏洞标题
ZF 车身稳定性支持Plus (RSSPlus) 初始漏洞导致的身份验证绕过
漏洞描述信息
ZF Roll Stability Support Plus (RSSPlus) 存在认证绕过漏洞,该漏洞针对确定性的RSSPlus SecurityAccess服务种子,可能允许攻击者通过无线射频设备或通过J2497远程信息处理设备进行跳转,远程调用本应仅用于维修场景的诊断功能。这可能会影响系统可用性,导致性能下降或软件被擦除,但车辆仍处于安全状态。
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
漏洞类别
认证机制不恰当
漏洞标题
ZF Roll Stability Support Plus (RSSPlus) Authentication Bypass By Primary Weakness
漏洞描述信息
ZF Roll Stability Support Plus (RSSPlus)
is vulnerable to an authentication bypass vulnerability targeting
deterministic RSSPlus SecurityAccess service seeds, which may allow an
attacker to remotely (proximal/adjacent with RF equipment or via pivot
from J2497 telematics devices) call diagnostic functions intended for
workshop or repair scenarios. This can impact system availability,
potentially degrading performance or erasing software, however the
vehicle remains in a safe vehicle state.
CVSS信息
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
漏洞类别
使用基本弱点进行的认证绕过