CVE-2018-18203

A vulnerability in the update mechanism of Subaru StarLink Harman head units 2017, 2018, and 2019 may give an attacker (with physical access to the vehicle's USB ports) the ability to rewrite the firmware of the head unit. This occurs because the device accepts modified QNX6 filesystem images (as long as the attacker obtains access to certain Harman decryption/encryption code) as a consequence of a bug where unsigned images pass a validity check. An attacker could potentially install persistent malicious head unit firmware and execute arbitrary code as the root user.
References
Link Resource
https://github.com/sgayou/subaru_starlink_research Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:subaru:starlink_2017_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:subaru:starlink_2017:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:subaru:starlink_2018_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:subaru:starlink_2018:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:subaru:starlink_2019_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:subaru:starlink_2019:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-11-28 23:29

Updated : 2024-02-04 20:03


NVD link : CVE-2018-18203

Mitre link : CVE-2018-18203

CVE.ORG link : CVE-2018-18203


JSON object : View

Products Affected

subaru

  • starlink_2019
  • starlink_2018_firmware
  • starlink_2018
  • starlink_2017
  • starlink_2019_firmware
  • starlink_2017_firmware
CWE
CWE-347

Improper Verification of Cryptographic Signature