Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-8356— Visteon Infotainment VIP MCU Code Insufficient Validation of Data Authenticity Local Privilege Escalation Vulnerability

EPSS 0.05% · P15
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-8356

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Visteon Infotainment VIP MCU Code Insufficient Validation of Data Authenticity Local Privilege Escalation Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Visteon Infotainment VIP MCU Code Insufficient Validation of Data Authenticity Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Visteon Infotainment systems. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the firmware update process of the VIP microcontroller. The process does not properly verify authenticity of the supplied firmware image before programming it into internal memory. An attacker can leverage this vulnerability to escalate privileges execute arbitrary code in the context of the VIP MCU. Was ZDI-CAN-23758.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对数据真实性的验证不充分
Source: NVD (National Vulnerability Database)
Vulnerability Title
Visteon Infotainment 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Visteon Infotainment是美国伟世通(Visteon)公司的一个汽车信息娱乐系统。 Visteon Infotainment存在数据伪造问题漏洞,该漏洞源于VIP微控制器固件更新过程中对提供的固件映像的真实性验证不足,可能导致本地攻击者在受影响的安装上提升权限执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
VisteonInfotainment cmu150_NA_74.00.324A -

II. Public POCs for CVE-2024-8356

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-8356

登录查看更多情报信息。

Same Patch Batch · Visteon · 2024-11-22 · 6 CVEs total

CVE-2024-8360Visteon Infotainment REFLASH_DDU_ExtractFile Command Injection Remote Code Execution Vulne
CVE-2024-8359Visteon Infotainment REFLASH_DDU_FindFile Command Injection Remote Code Execution Vulnerab
CVE-2024-8357Visteon Infotainment App SoC Missing Immutable Root of Trust in Hardware Local Privilege E
CVE-2024-8355Visteon Infotainment System DeviceManager iAP Serial Number SQL Injection Vulnerability
CVE-2024-8358Visteon Infotainment UPDATES_ExtractFile Command Injection Remote Code Execution Vulnerabi

IV. Related Vulnerabilities

V. Comments for CVE-2024-8356

No comments yet


Leave a comment