Unpatched Mazda Connect bugs let hackers install persistent malware

Share:

Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models including Mazda 3 (2014-2021), to execute arbitrary code with root permission.

The security issues remain unpatched and some of them are command injection flaws that could be leveraged to obtain unrestricted access to vehicle networks, potentially impacting the car’s operation and safety.

Vulnerability details

Researchers found the flaws in the Mazda Connect Connectivity Master Unit from Visteon, with software initially developed by Johnson Controls. They analyzed the latest version of the firmware (74.00.324A), for which there are no publicly reported vulnerabilities.

The CMU has its own community of users that modify it to improve functionality (modding). However, installing the tweaks relies on software vulnerabilities.

In a report yesterday, Trend Micro’s Zero Day Initiative (ZDI) explains that the discovered problems vary from SQL injection and command injection to unsigned code:

  • CVE-2024-8355: SQL Injection in DeviceManager – Allows attackers to manipulate the database or execute code by inserting malicious input when connecting a spoofed Apple device.
  • CVE-2024-8359: Command Injection in REFLASH_DDU_FindFile – Lets attackers run arbitrary commands on the infotainment system by injecting commands into file path inputs.
  • CVE-2024-8360: Command Injection in REFLASH_DDU_ExtractFile – Similar to the previous flaw, it allows attackers to execute arbitrary OS commands through unsanitized file paths.
  • CVE-2024-8358: Command Injection in UPDATES_ExtractFile – Allows command execution by embedding commands in file paths used during the update process.
  • CVE-2024-8357: Missing Root of Trust in App SoC – Lacks security checks in the boot process, enabling attackers to maintain control over the infotainment system post-attack.
  • CVE-2024-8356: Unsigned Code in VIP MCU – Allows attackers to upload unauthorized firmware, potentially granting control over certain vehicle subsystems.

Exploitability and potential risks

Exploiting the six vulnerabilities above, though, requires physical access to the infotainment system.

Dmitry Janushkevich, senior vulnerability researcher at ZDI, explains that a threat actor could connect with a USB device and deploy the attack automatically within minutes.

Despite this limitation, the researcher notes that unauthorized physical access is easily obtainable, especially in valet parking and during service at workshops or at dealerships.

According to the report, compromising a car’s infotainment system using the disclosed vulnerabilities could allow database manipulation, information disclosure, creating arbitrary files, injecting arbitrary OS commands that could lead to full compromise of the system, gaining persistence, and executing arbitrary code before the operation system boots.

By exploiting CVE-2024-8356, a threat actor could install a malicious firmware version and gain direct access to the connected controller area networks (CAN buses) and reach the vehicle’s electronic control units (ECUs) for the engine, brakes, transmission, or powertrain.

Janushkevich says that the attack chain takes just a few minutes, “from plugging in a USB drive to installing a crafted update,” in a controlled environment. However, a targeted attack could also compromise connected devices and lead to denial of service, bricking, or ransomware.

Update 11/18 – A Mazda spokesperson has sent BleepingComputer the following comment in regards to the above:

Mazda is aware of the vulnerabilities that are described in some articles. Although Mazda refrains from responding to specific measures and details, Mazda is continuing to develop technologies and implement countermeasures to remedy the vulnerabilities in the system in order to protect customer safety and assets. We refrain from responding to specifics about countermeasures.

It’s worth noting that an attack against this vulnerability requires a vehicle key (key FOB / remote transmitter), and in addition, this attack cannot be performed remotely. Therefore, we think the possibility of exploitation to be extremely low.

We apologise for any inconvenience and concern caused to our customers by this. – Mazda spokesperson

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:05 am, Feb 2, 2025
weather icon 3°C
L: 2° | H: 5°
clear sky
Humidity: 90 %
Pressure: 1022 mb
Wind: 4 mph SW
Wind Gust: 12 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 5%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 7:37 am
Sunset: 4:51 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
2° | 5°°C 0 mm 0% 7 mph 80 % 1025 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
3° | 9°°C 0 mm 0% 8 mph 91 % 1025 mb 0 mm/h
Tue Feb 04 9:00 pm
weather icon
6° | 9°°C 1 mm 100% 13 mph 93 % 1026 mb 0 mm/h
Wed Feb 05 9:00 pm
weather icon
4° | 7°°C 0 mm 0% 10 mph 86 % 1045 mb 0 mm/h
Thu Feb 06 9:00 pm
weather icon
2° | 8°°C 0 mm 0% 8 mph 86 % 1045 mb 0 mm/h
Today 12:00 pm
weather icon
4° | 7°°C 0 mm 0% 7 mph 80 % 1022 mb 0 mm/h
Today 3:00 pm
weather icon
6° | 8°°C 0 mm 0% 7 mph 67 % 1022 mb 0 mm/h
Today 6:00 pm
weather icon
5° | 5°°C 0 mm 0% 4 mph 74 % 1023 mb 0 mm/h
Today 9:00 pm
weather icon
4° | 4°°C 0 mm 0% 4 mph 79 % 1025 mb 0 mm/h
Tomorrow 12:00 am
weather icon
3° | 3°°C 0 mm 0% 4 mph 79 % 1025 mb 0 mm/h
Tomorrow 3:00 am
weather icon
3° | 3°°C 0 mm 0% 4 mph 86 % 1025 mb 0 mm/h
Tomorrow 6:00 am
weather icon
4° | 4°°C 0 mm 0% 4 mph 86 % 1025 mb 0 mm/h
Tomorrow 9:00 am
weather icon
5° | 5°°C 0 mm 0% 4 mph 87 % 1025 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€96,114.11
-1.98%
Ethereum(ETH)
€2,995.91
-4.16%
XRP(XRP)
€2.79
-2.98%
Tether(USDT)
€0.96
0.00%
Solana(SOL)
€206.14
-6.15%
USDC(USDC)
€0.96
0.01%
Dogecoin(DOGE)
€0.290910
-6.26%
Shiba Inu(SHIB)
€0.000016
-6.19%
Pepe(PEPE)
€0.000012
-8.06%
Scroll to Top