Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector,

CVE-2023–29389

Published on: Not Yet Published

Last Modified on: 04/05/2023 05:35:00 PM UTC

CVE-2023–29389

The following vulnerability was found:

Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector, and then sending forged “Key is validated” messages via CAN Injection, as exploited in the wild in (for example) July 2022.

  • CVE-2023–29389 has been assigned by
  • cve@mitre.org to track the vulnerability

CVE References

Description Tags Link CAN Injection: keyless car theft | Dr. Ken Tindell kentindell.github.io
text/html

MISC kentindell.github.io/2023/04/03/can-injection/Can Injection: keyless car theft | Hacker News news.ycombinator.com
text/html

MISC news.ycombinator.com/item?id=35452963

By selecting these links, you may be leaving CVEreport webspace. We have provided these links to other websites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other websites that are more appropriate for your purpose. CVEreport does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, CVEreport does not endorse any commercial products that may be mentioned on these sites. Please address comments about any linked pages to comment@cve.report.

There are currently no QIDs associated with this CVE

There are no known software configurations (CPEs) currently associated with this CVE

No vendor comments have been submitted for this CVE

Social Mention

@CVEreport CVE-2023–29389 : Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows… twitter.com/i/web/status/1… 2023–04–05 16:05:33

/r/netcve CVE-2023–29389 2023–04–05 17:20:06

/r/Team_IT_Security CVE-2023–29389 2023–04–05 18:26:12

© CVE.report 2023

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE’s CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report

--

--

Ganesh-cyber security latest updates

PGP in cyber security, Researcher, and working as cyber security anlayst,