CVE-2023-29389
CVSS V2 None
CVSS V3 None
Description
Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector, and then sending forged "Key is validated" messages via CAN Injection, as exploited in the wild in (for example) July 2022.
Overview
- CVE ID
- CVE-2023-29389
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-05T16:15:08
- Last Modified Date
- 2023-04-14T16:03:43
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:toyota:rav4_firmware:2021:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:toyota:rav4:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://kentindell.github.io/2023/04/03/can-injection/ | Exploit Third Party Advisory |
https://news.ycombinator.com/item?id=35452963 | Issue Tracking |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-29389 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29389 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 04:11:26 | Added to TrackCVE | |||
2023-04-17 04:11:28 | Weakness Enumeration | new |