CVE-2025-32058

9.3 CRITICAL

📋 TL;DR

This vulnerability allows an attacker with code execution on the infotainment system's main processor to execute arbitrary code on the RH850 CAN communication module, enabling them to send malicious CAN bus messages. This affects Nissan Leaf ZE1 vehicles manufactured in 2020 with Bosch infotainment systems. The vulnerability could allow vehicle control manipulation through the CAN bus.

💻 Affected Systems

Products:
  • Nissan Leaf ZE1 infotainment system manufactured by Bosch
Versions: Unknown specific versions, affects vehicles manufactured in 2020
Operating Systems: Embedded automotive OS on Bosch infotainment system
Default Config Vulnerable: ⚠️ Yes
Notes: Requires initial code execution on infotainment main SoC to exploit the RH850 vulnerability

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete vehicle compromise allowing remote attacker to control critical systems like braking, steering, or acceleration through malicious CAN messages, potentially causing accidents or vehicle theft.

🟠

Likely Case

Attacker gains ability to send arbitrary CAN messages, potentially enabling unauthorized access to vehicle systems, disabling safety features, or extracting sensitive data from vehicle networks.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to infotainment system only, preventing CAN bus access and maintaining vehicle safety systems integrity.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires initial access to infotainment system, then leverages protocol vulnerability in RH850 communication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.nissan.co.uk/vehicles/new-vehicles/leaf.html

Restart Required: Yes

Instructions:

Contact Nissan dealership for vehicle software updates. No self-patching available.

🔧 Temporary Workarounds

Disable vulnerable interfaces

all

Disable or restrict access to infotainment system interfaces that could provide initial code execution

Network segmentation

all

Implement strict network segmentation between infotainment system and critical vehicle CAN networks

🧯 If You Can't Patch

  • Implement physical access controls to prevent unauthorized access to vehicle diagnostic ports
  • Monitor for unusual CAN bus traffic patterns and implement intrusion detection for vehicle networks

🔍 How to Verify

Check if Vulnerable:

Check vehicle VIN and manufacturing date (2020 Nissan Leaf ZE1). Consult Nissan dealership for specific vehicle software version checks.

Check Version:

No command available - requires dealership diagnostic tools

Verify Fix Applied:

Verify with Nissan dealership that vehicle has received latest software updates addressing the vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CAN message patterns
  • Unexpected protocol requests to RH850 module
  • Infotainment system compromise indicators

Network Indicators:

  • Malformed INC protocol packets
  • Unauthorized CAN bus message injection
  • Suspicious infotainment system network traffic

SIEM Query:

Not applicable - requires specialized automotive network monitoring

🔗 References

📤 Share & Export