cve/2023/CVE-2023-29389.md

21 lines
973 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-29389](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29389)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector, and then sending forged "Key is validated" messages via CAN Injection, as exploited in the wild in (for example) July 2022.
### POC
#### Reference
No PoCs from references.
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/1-tong/vehicle_cves
2024-05-25 21:48:12 +02:00
- https://github.com/Vu1nT0tal/Vehicle-Security
- https://github.com/VulnTotal-Team/Vehicle-Security
- https://github.com/VulnTotal-Team/vehicle_cves