CVE-2023-29389
Published Apr 5, 2023
Last updated 2 years ago
Overview
- Description
- Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector, and then sending forged "Key is validated" messages via CAN Injection, as exploited in the wild in (for example) July 2022.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.8
- Impact score
- 5.9
- Exploitability score
- 0.9
- Vector string
- CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- CWE-74
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:toyota:rav4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7C484E0F-6B8A-4820-828D-141487E8EC39" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:toyota:rav4_firmware:2021:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44F36E9A-6C18-45DD-AB29-41CB33C99D2E" } ], "operator": "OR" } ], "operator": "AND" } ]