CVE-2023-34398

7.5 HIGH

📋 TL;DR

A null pointer dereference vulnerability in the Boost library used by Mercedes-Benz NTG6 head units allows potential denial of service or arbitrary code execution when processing malicious USB profile data. This affects Mercedes-Benz vehicles with NTG6 infotainment systems. Attackers with physical USB access to the vehicle's head unit could exploit this vulnerability.

💻 Affected Systems

Products:
  • Mercedes-Benz vehicles with NTG6 head unit/infotainment system
Versions: All versions prior to patched firmware
Operating Systems: Embedded automotive OS on NTG6 platform
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default configuration when USB profile import/export feature is enabled. Requires physical USB port access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash of the head unit, potential arbitrary code execution leading to vehicle control compromise, or persistent malware installation affecting vehicle systems.

🟠

Likely Case

Head unit crash or freeze requiring restart, temporary loss of infotainment functionality while driving, potential data corruption in profile settings.

🟢

If Mitigated

Minor disruption to USB profile import/export functionality with no impact on core vehicle operations.

🌐 Internet-Facing: LOW - Requires physical USB access to the vehicle's head unit, not remotely exploitable over network.
🏢 Internal Only: MEDIUM - Physical access to vehicle interior required, but many vehicles are parked in unsecured locations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires crafting malicious USB data with specific serialized archive structure to trigger null pointer dereference. Physical access to vehicle's USB port is necessary.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific firmware version from Mercedes-Benz (contact dealer for exact version)

Vendor Advisory: https://securelist.com/mercedes-benz-head-unit-security-research/115218/

Restart Required: No

Instructions:

1. Contact authorized Mercedes-Benz dealer. 2. Schedule firmware update for NTG6 head unit. 3. Dealer will apply the latest firmware patch. 4. Verify update completion through system information menu.

🔧 Temporary Workarounds

Disable USB profile import/export

all

Disable the vulnerable USB profile transfer functionality in head unit settings

Physical USB port protection

all

Use physical USB port locks or covers to prevent unauthorized USB device insertion

🧯 If You Can't Patch

  • Disable USB profile import/export feature in vehicle settings
  • Physically secure vehicle when unattended to prevent USB port access
  • Educate users about risks of unknown USB devices in vehicle ports

🔍 How to Verify

Check if Vulnerable:

Check if USB profile import/export functions work with specially crafted test data (requires security testing expertise)

Check Version:

Navigate to: Settings > System > System Information in head unit interface

Verify Fix Applied:

Verify firmware version in head unit system information matches latest patched version from Mercedes-Benz

📡 Detection & Monitoring

Log Indicators:

  • USB profile import/export failures
  • System crash logs from head unit
  • Unexpected process terminations in infotainment system

Network Indicators:

  • No network indicators - physical attack only

SIEM Query:

Not applicable - physical access attack with no network traffic

🔗 References

📤 Share & Export