CVE-2024-6245

7.4 HIGH

📋 TL;DR

This CVE describes a use of default credentials vulnerability in Maruti Suzuki SmartPlay infotainment systems on Linux. Attackers can attempt common or default usernames and passwords to gain unauthorized access. This affects 2022 Maruti Suzuki Brezza vehicles in the Indian market with specific SmartPlay software versions.

💻 Affected Systems

Products:
  • Maruti Suzuki SmartPlay Infotainment System
Versions: 66T0.05.50
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects 2022 Maruti Suzuki Brezza vehicles in Indian market. Requires physical or local network access to the vehicle's infotainment system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the infotainment system allowing attackers to access vehicle data, control entertainment functions, potentially bridge to other vehicle systems, or install malicious software.

🟠

Likely Case

Unauthorized access to infotainment features, potential data theft from connected devices, and disruption of entertainment/navigation functions.

🟢

If Mitigated

Limited impact if strong unique credentials are implemented and network access is restricted.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to the vehicle's infotainment system interface, either physically or through connected networks. Default credential attacks are well-understood and easily automated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.marutisuzuki.com/corporate/technology/smartplay-systems

Restart Required: No

Instructions:

1. Contact Maruti Suzuki dealership or authorized service center. 2. Request security update for SmartPlay system. 3. Follow technician instructions for software update installation.

🔧 Temporary Workarounds

Change Default Credentials

linux

Change any default usernames and passwords to strong, unique credentials.

Access SmartPlay system settings > Security > Change credentials

Disable Unnecessary Services

linux

Disable any network services or connectivity features not required for normal operation.

Access system settings > Network > Disable unused connections

🧯 If You Can't Patch

  • Implement strong unique credentials immediately
  • Restrict physical access to the vehicle and disable unnecessary network connectivity

🔍 How to Verify

Check if Vulnerable:

Check if default credentials work on the SmartPlay system login interface. Access system settings > About to check software version.

Check Version:

Access SmartPlay Settings > System Information > Software Version

Verify Fix Applied:

Attempt to login with default credentials - should fail. Verify new credentials work. Check software version matches patched release.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts
  • Successful logins from unusual locations/times
  • Authentication events with default usernames

Network Indicators:

  • Unusual network traffic from infotainment system
  • Connection attempts to unexpected external addresses

SIEM Query:

source="smartplay_system" AND (event_type="authentication_failure" OR event_type="authentication_success")

🔗 References

📤 Share & Export