Vulnerability Details : CVE-2023-26244
An issue was discovered in the Hyundai Gen5W_L in-vehicle infotainment system AE_E_PE_EUR.S5W_L001.001.211214. The AppDMClient binary file, which is used during the firmware installation process, can be modified by an attacker to bypass the digital signature check of AppUpgrade and .lge.upgrade.xml files, which are used during the firmware installation process. This indirectly allows an attacker to use a custom version of AppUpgrade and .lge.upgrade.xml files.
Products affected by CVE-2023-26244
- cpe:2.3:o:hyundai:gen5w_l_in-vehicle_infotainment_system_firmware:5w.xxx.s5w_l.001.001.221129:*:*:*:*:*:*:*
- Hyundai » Gen5w L In-vehicle Infotainment System Firmware » Version: Ae E Pe Eur.s5w L001.001.211214cpe:2.3:o:hyundai:gen5w_l_in-vehicle_infotainment_system_firmware:ae_e_pe_eur.s5w_l001.001.211214:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-26244
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-26244
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2023-26244
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-26244
-
https://sowhat.iit.cnr.it:8443/can-work/chimaera/-/blob/main/Report/IIT-01-2023.pdf
Report/IIT-01-2023.pdf · main · Can Work / CHIMAERA · GitLabExploit;Third Party Advisory
-
https://sowhat.iit.cnr.it:8443/can-work/chimaera
Can Work / CHIMAERA · GitLabExploit;Third Party Advisory
-
https://sowhat.iit.cnr.it
sowhat | Security Of the Way to Handle Automotive sysTemsNot Applicable
Jump to