CVE-2022-37418
https://notcve.org/view.php?id=CVE-2022-37418
The Remote Keyless Entry (RKE) receiving unit on certain Nissan, Kia, and Hyundai vehicles through 2017 allows remote attackers to perform unlock operations and force a resynchronization after capturing two consecutive valid key fob signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely. La unidad receptora de entrada remota sin llave (RKE) en determinados vehículos Nissan, Kia y Hyundai versiones hasta 2017, permite a atacantes remotos llevar a cabo operaciones de desbloqueo y forzar una resincronización después de capturar dos señales válidas consecutivas del llavero a través de la radio, también se conoce como un ataque RollBack. El atacante conserva la capacidad de desbloquear indefinidamente. • https://hackaday.com/2022/08/17/rollback-breaks-into-your-car https://medium.com/codex/rollback-a-new-time-agnostic-replay-attack-against-the-automotive-remote-keyless-entry-systems-df5f99ba9490 https://www.blackhat.com/us-22/briefings/schedule/#rollback---a-new-time-agnostic-replay-attack-against-the-automotive-remote-keyless-entry-systems-27185 https://www.pcmag.com/news/is-your-car-key-fob-vulnerable-to-this-simple-replay-attack https://www.youtube.com/playlist?list=PLYodcy84oQL1gxwiuRm13xRXxTQL9cO5t • CWE-294: Authentication Bypass by Capture-replay •
CVE-2020-8539
https://notcve.org/view.php?id=CVE-2020-8539
Kia Motors Head Unit with Software version: SOP.003.30.18.0703, SOP.005.7.181019, and SOP.007.1.191209 may allow an attacker to inject unauthorized commands, by executing the micomd executable deamon, to trigger unintended functionalities. In addition, this executable may be used by an attacker to inject commands to generate CAN frames that are sent into the M-CAN bus (Multimedia CAN bus) of the vehicle. Kia Motors Head Unit con versión de Software: SOP.003.30.18.0703, SOP.005.7.181019 y SOP.007.1.191209, pueden permitir a un atacante inyectar comandos no autorizados, mediante la ejecución del demonio del ejecutable micomd, para activar funciones no deseadas. Además, este ejecutable puede ser usado por un atacante para inyectar comandos para generar tramas CAN que se envían al bus M-CAN (bus Multimedia CAN) del vehículo • https://gist.github.com/gianpyc/4dc8b0d0c29774a10a97785711e325c3 https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf • CWE-276: Incorrect Default Permissions •