CVE-2023-40728

7.3 HIGH

📋 TL;DR

QMS Automotive versions before V12.39 store sensitive application data in insecure external storage via the QMS.Mobile module. This allows attackers with physical or logical access to modify data, potentially leading to arbitrary code execution or denial-of-service. All users of QMS Automotive below V12.39 are affected.

💻 Affected Systems

Products:
  • QMS Automotive
Versions: All versions < V12.39
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the QMS.Mobile module. Requires mobile device access or compromised mobile management systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full control of the system through arbitrary code execution, potentially compromising the entire automotive system or adjacent networks.

🟠

Likely Case

Data manipulation leading to application crashes, incorrect system behavior, or limited code execution within the application context.

🟢

If Mitigated

Unauthorized data access but limited impact due to application sandboxing or additional security controls.

🌐 Internet-Facing: LOW - Requires physical or logical access to the device storage, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers with device access or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the device's external storage, which could be achieved through physical access, malware, or compromised mobile device management.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V12.39

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf

Restart Required: Yes

Instructions:

1. Download QMS Automotive V12.39 or later from Siemens support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the application and verify functionality.

🔧 Temporary Workarounds

Restrict External Storage Access

all

Use mobile device management (MDM) policies to restrict application access to external storage

MDM-specific configuration commands vary by platform

Application Sandboxing

all

Implement additional application containerization or sandboxing to limit storage access

Platform-specific sandboxing commands

🧯 If You Can't Patch

  • Isolate affected systems from critical networks and implement strict access controls
  • Implement enhanced monitoring for unauthorized storage access attempts and application behavior anomalies

🔍 How to Verify

Check if Vulnerable:

Check QMS Automotive version in application settings or about section. If version is below V12.39, the system is vulnerable.

Check Version:

Application-specific: Check 'About' or 'Settings' section within QMS Automotive application

Verify Fix Applied:

Verify version is V12.39 or higher in application settings. Test that sensitive data is no longer stored in external storage locations.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to application data files in external storage
  • Application crashes or abnormal behavior after storage access

Network Indicators:

  • Unusual data transfers from mobile devices to external systems

SIEM Query:

source="mobile_device" AND (event="external_storage_access" OR app="QMS.Mobile") AND result="success"

🔗 References

📤 Share & Export