cvelist/2024/12xxx/CVE-2024-12054.json
2025-02-13 23:00:32 +00:00

136 lines
7.6 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-12054",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "ZF Roll Stability Support Plus (RSSPlus) \nis vulnerable to an authentication bypass vulnerability targeting \ndeterministic RSSPlus SecurityAccess service seeds, which may allow an \nattacker to remotely (proximal/adjacent with RF equipment or via pivot \nfrom J2497 telematics devices) call diagnostic functions intended for \nworkshop or repair scenarios. This can impact system availability, \npotentially degrading performance or erasing software, however the \nvehicle remains in a safe vehicle state."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-305",
"cweId": "CWE-305"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ZF",
"product": {
"product_data": [
{
"product_name": "RSSPlus 2M",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "01/08",
"version_value": "01/23"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-021-03",
"refsource": "MISC",
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-021-03"
},
{
"url": "https://nmfta.org/wp-content/media/2022/11/Actionable_Mitigations_Options_v9_DIST.pdf",
"refsource": "MISC",
"name": "https://nmfta.org/wp-content/media/2022/11/Actionable_Mitigations_Options_v9_DIST.pdf"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "ICSA-25-021-03",
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "To most effectively mitigate general vulnerabilities of the powerline \ncommunication, any trucks, trailers, and tractors utilizing J2497 \ntechnology should disable all features where possible, except for \nbackwards-compatibility with LAMP ON detection only. Users acquiring new\n trailer equipment should migrate all diagnostics to newer trailer bus \ntechnology. Users acquiring new tractor equipment should remove support \nfor reception of any J2497 message other than LAMP messages.\n\n<br>"
}
],
"value": "To most effectively mitigate general vulnerabilities of the powerline \ncommunication, any trucks, trailers, and tractors utilizing J2497 \ntechnology should disable all features where possible, except for \nbackwards-compatibility with LAMP ON detection only. Users acquiring new\n trailer equipment should migrate all diagnostics to newer trailer bus \ntechnology. Users acquiring new tractor equipment should remove support \nfor reception of any J2497 message other than LAMP messages."
},
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>ZF recommends:</p>\n<ul>\n<li>Moving away from security access and implementing the latest security feature authenticate (0x29).&nbsp; <br></li>\n<li>Ensure random numbers are generated from a cryptographically secure hardware true random number generator.&nbsp; <br></li>\n<li>Adopting modern standards/protocols for truck trailer communication.&nbsp; <br></li>\n</ul>\n\n<br>"
}
],
"value": "ZF recommends:\n\n\n\n * Moving away from security access and implementing the latest security feature authenticate (0x29).\u00a0 \n\n\n * Ensure random numbers are generated from a cryptographically secure hardware true random number generator.\u00a0 \n\n\n * Adopting modern standards/protocols for truck trailer communication."
},
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>NMFTA has published detailed information about how to mitigate these issues in the following ways:</p>\n<ul>\n<li>Install a LAMP ON firewall for each ECU.&nbsp; <br></li>\n<li>Use a LAMP detect circuit LAMP ON sender with each trailer.&nbsp; <br></li>\n<li>Change addresses dynamically on each tractor in response to detecting a transmitter on its current address.&nbsp; <br></li>\n<li>Install RF chokes on each trailer between chassis ground and wiring ground.&nbsp; <br></li>\n<li>Load with LAMP keyhole signal on each tractor.&nbsp; <br></li>\n<li>Flood with jamming signal on each tractor.&nbsp; <br></li>\n</ul>\n<p>Please visit <a target=\"_blank\" rel=\"nofollow\" href=\"https://nmfta.org/wp-content/media/2022/11/Actionable_Mitigations_Options_v9_DIST.pdf\">NMFTA</a></p> for additional details on these and other solutions.\n\n<br>"
}
],
"value": "NMFTA has published detailed information about how to mitigate these issues in the following ways:\n\n\n\n * Install a LAMP ON firewall for each ECU.\u00a0 \n\n\n * Use a LAMP detect circuit LAMP ON sender with each trailer.\u00a0 \n\n\n * Change addresses dynamically on each tractor in response to detecting a transmitter on its current address.\u00a0 \n\n\n * Install RF chokes on each trailer between chassis ground and wiring ground.\u00a0 \n\n\n * Load with LAMP keyhole signal on each tractor.\u00a0 \n\n\n * Flood with jamming signal on each tractor.\u00a0 \n\n\n\n\n\nPlease visit NMFTA https://nmfta.org/wp-content/media/2022/11/Actionable_Mitigations_Options_v9_DIST.pdf \n\n for additional details on these and other solutions."
}
],
"credits": [
{
"lang": "en",
"value": "National Motor Freight Traffic Association, Inc. (NMFTA) researchers Ben Gardiner and Anne Zachos reported this vulnerability to CISA."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
}
]
}
}