漏洞标题
N/A
漏洞描述信息
在梅赛德斯-奔驰NTG(新一代远程信息技术)6至2021版本中发现了一个问题。Apple Car Play功能中可能存在空指针解引用漏洞,影响NTG 6主机。执行此类攻击需要对主机基板的以太网引脚进行物理访问。通过使用静态IP地址,攻击者可以通过内部网络连接到AirTunes / AirPlay服务。利用预先准备的HTTP请求,攻击者可以使Car Play服务失效。
CVSS信息
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞类别
空指针解引用
漏洞标题
N/A
漏洞描述信息
An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible NULL pointer dereference in the Apple Car Play function affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the AirTunes / AirPlay service. With prepared HTTP requests, an attacker can cause the Car Play service to fail.
CVSS信息
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞类别
N/A