After more than half a year of security testing in the Mercedes-Benz source code, Tencent Security researchers found at least five critical flaws in the computer and entertainment systems of the prestigious automaker. According to the report, the flaws were found in Mercedes-Benz User Experience (MBUX), a system launched at the end of 2018 for Class A vehicles.
Experts tracked these vulnerabilities as CVE-2021-23906, CVE-2021-23907, CVE-2021-23908, CVE-2021-23909 and CVE-2021-23910, and ensure that their operation allows threat actors to take remote control of some car functions with this system, although they do not compromise their physical characteristics such as brakes or steering system.
This research also addressed the Mercedes-Benz T-Box, which could be successfully exploited in certain circumstances that are perfectly applicable to real-world scenarios.
Possible consequences of exploiting these flaws include heap overflow scenarios, memory leaks, and possible remote code execution, as well as the ability to configure a remote shell using an MBUX browser flaw.
During testing, threat actors made the initial commitment using a persistent web shell with root privileges, allowing them to unlock specific features in the car, including anti-theft protection, as well as installing a persistent backdoor on the target system. By sending specially designed CAN messages, researchers were also able to control the light, air conditioning and even control car seats, although as mentioned above, these attacks do not allow you to take control of the vehicle.
On the other hand, attack scenarios targeting the T-Box include abuse of the WiFi chip included in the system, in addition to the STA8090 chip that functions as an IC receiver, the CAN bus and even the LTE connection, based on Huawei technology.
Experts also described some types of attack tested against this system but did not result in malicious scenarios. The report has already been submitted to Daimler, the company that owns Mercedes-Benz, and the affected T-Box and MBUX implementations are expected to have already been updated.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.