CVE-2023-26244
Published Apr 27, 2023
Last updated 2 years ago
Overview
- Description
- An issue was discovered in the Hyundai Gen5W_L in-vehicle infotainment system AE_E_PE_EUR.S5W_L001.001.211214. The AppDMClient binary file, which is used during the firmware installation process, can be modified by an attacker to bypass the digital signature check of AppUpgrade and .lge.upgrade.xml files, which are used during the firmware installation process. This indirectly allows an attacker to use a custom version of AppUpgrade and .lge.upgrade.xml files.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-269
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:hyundai:gen5w_l_in-vehicle_infotainment_system_firmware:5w.xxx.s5w_l.001.001.221129:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B1D75CC-4D29-4918-BBE4-84316697F0C0" }, { "criteria": "cpe:2.3:o:hyundai:gen5w_l_in-vehicle_infotainment_system_firmware:ae_e_pe_eur.s5w_l001.001.211214:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E140A27C-DEAE-4DAA-9E91-448A32B1D055" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:hyundai:gen5w_l_in-vehicle_infotainment_system:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "875AC44B-6F21-4286-A29A-9E72EFB0F3F3" } ], "operator": "OR" } ], "operator": "AND" } ]