CVE-2024-36842

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Oncord+ Android Infotainment Systems via the ADB (Android Debug Bridge) port. Attackers can gain full system control without authentication. This affects vehicles with the specific hardware and software versions listed.

💻 Affected Systems

Products:
  • Oncord+ Android Infotainment Systems
Versions: Build Number PlatformVER:K24-2023/05/09-v0.01
Operating Systems: Android 12
Default Config Vulnerable: ⚠️ Yes
Notes: Specific hardware required: Model Hardware TS17, Hardware part Number F57L_V3.2_20220301

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of infotainment system allowing attackers to control vehicle functions, access personal data, install malware, or potentially affect safety-critical systems if integrated.

🟠

Likely Case

Unauthorized access to infotainment system allowing data theft, surveillance, or installation of malicious apps that could affect vehicle operation.

🟢

If Mitigated

Limited impact if ADB access is disabled or network segmentation prevents remote access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository demonstrates exploitation via ADB port. No authentication required for remote code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Contact Oncord for firmware updates or security guidance.

🔧 Temporary Workarounds

Disable ADB Access

android

Disable Android Debug Bridge (ADB) functionality to prevent remote exploitation

adb shell settings put global adb_enabled 0
adb shell setprop persist.adb.tcp.port -1

Network Segmentation

all

Isolate infotainment system network from untrusted networks

🧯 If You Can't Patch

  • Physically disconnect infotainment system from vehicle networks if possible
  • Implement strict firewall rules blocking all inbound connections to ADB port (default 5555)

🔍 How to Verify

Check if Vulnerable:

Check if ADB is enabled and accessible: 'adb devices' from another device on same network, or scan port 5555

Check Version:

Check Settings > About > Build Number for PlatformVER:K24-2023/05/09-v0.01

Verify Fix Applied:

Verify ADB is disabled: 'adb shell getprop persist.adb.tcp.port' should return -1, and port 5555 should be closed

📡 Detection & Monitoring

Log Indicators:

  • ADB connection attempts in system logs
  • Unauthorized shell commands executed

Network Indicators:

  • TCP connections to port 5555 from external IPs
  • ADB protocol traffic on vehicle network

SIEM Query:

source="vehicle_network" dest_port=5555 OR protocol="adb"

🔗 References

📤 Share & Export