CVE-2023-34398
📋 TL;DR
A null pointer dereference vulnerability in the Boost library used by Mercedes-Benz NTG6 head units allows potential denial of service or arbitrary code execution when processing malicious USB profile data. This affects Mercedes-Benz vehicles with NTG6 infotainment systems. Attackers with physical USB access to the vehicle's head unit could exploit this vulnerability.
💻 Affected Systems
- Mercedes-Benz vehicles with NTG6 head unit/infotainment system
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash of the head unit, potential arbitrary code execution leading to vehicle control compromise, or persistent malware installation affecting vehicle systems.
Likely Case
Head unit crash or freeze requiring restart, temporary loss of infotainment functionality while driving, potential data corruption in profile settings.
If Mitigated
Minor disruption to USB profile import/export functionality with no impact on core vehicle operations.
🎯 Exploit Status
Requires crafting malicious USB data with specific serialized archive structure to trigger null pointer dereference. Physical access to vehicle's USB port is necessary.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Specific firmware version from Mercedes-Benz (contact dealer for exact version)
Vendor Advisory: https://securelist.com/mercedes-benz-head-unit-security-research/115218/
Restart Required: No
Instructions:
1. Contact authorized Mercedes-Benz dealer. 2. Schedule firmware update for NTG6 head unit. 3. Dealer will apply the latest firmware patch. 4. Verify update completion through system information menu.
🔧 Temporary Workarounds
Disable USB profile import/export
allDisable the vulnerable USB profile transfer functionality in head unit settings
Physical USB port protection
allUse physical USB port locks or covers to prevent unauthorized USB device insertion
🧯 If You Can't Patch
- Disable USB profile import/export feature in vehicle settings
- Physically secure vehicle when unattended to prevent USB port access
- Educate users about risks of unknown USB devices in vehicle ports
🔍 How to Verify
Check if Vulnerable:
Check if USB profile import/export functions work with specially crafted test data (requires security testing expertise)
Check Version:
Navigate to: Settings > System > System Information in head unit interface
Verify Fix Applied:
Verify firmware version in head unit system information matches latest patched version from Mercedes-Benz
📡 Detection & Monitoring
Log Indicators:
- USB profile import/export failures
- System crash logs from head unit
- Unexpected process terminations in infotainment system
Network Indicators:
- No network indicators - physical attack only
SIEM Query:
Not applicable - physical access attack with no network traffic