CVE-2024-12054

5.4 MEDIUM

📋 TL;DR

This authentication bypass vulnerability in ZF Roll Stability Support Plus (RSSPlus) allows attackers to remotely access diagnostic functions intended only for authorized workshop technicians. Attackers can potentially degrade system performance or erase software, though the vehicle remains in a safe state. Affected systems include vehicles with vulnerable ZF RSSPlus components.

💻 Affected Systems

Products:
  • ZF Roll Stability Support Plus (RSSPlus)
Versions: Specific versions not detailed in advisory
Operating Systems: Embedded automotive systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires proximity/RF equipment or pivot from J2497 telematics devices; affects vehicles with vulnerable RSSPlus implementations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker remotely erases critical software components, causing system degradation that requires physical repair and impacts vehicle availability.

🟠

Likely Case

Unauthorized diagnostic access leading to performance degradation or nuisance-level disruptions requiring system resets.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized diagnostic access.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires specialized RF equipment or access to telematics devices; targets deterministic SecurityAccess service seeds.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-021-03

Restart Required: Yes

Instructions:

1. Contact ZF or vehicle manufacturer for specific firmware updates 2. Apply firmware patches to affected RSSPlus systems 3. Restart affected systems after patching

🔧 Temporary Workarounds

Network Segmentation

all

Isolate diagnostic networks from production vehicle networks

Access Control

all

Implement strict physical and network access controls for diagnostic interfaces

🧯 If You Can't Patch

  • Implement network segmentation to isolate diagnostic interfaces
  • Deploy physical security controls to prevent unauthorized access to vehicle diagnostic ports

🔍 How to Verify

Check if Vulnerable:

Check with vehicle manufacturer or ZF for specific firmware versions and vulnerability assessment

Check Version:

Manufacturer-specific diagnostic tool commands (consult vehicle service documentation)

Verify Fix Applied:

Verify firmware version matches patched version from manufacturer and test diagnostic access controls

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized diagnostic session attempts
  • Multiple failed SecurityAccess attempts
  • Unexpected diagnostic function calls

Network Indicators:

  • Unusual diagnostic protocol traffic from unauthorized sources
  • RF-based diagnostic attempts

SIEM Query:

source:diagnostic_protocol AND (event_type:authentication_bypass OR failed_attempts > threshold)

🔗 References

📤 Share & Export