CVE-2015-5611 Details

CVE-2015-5611

Published: 2015-07-21
Last Modified: 2016-12-24
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Unspecified vulnerability in Uconnect before 15.26.1, as used in certain Fiat Chrysler Automobiles (FCA) from 2013 to 2015 models, allows remote attackers in the same cellular network to control vehicle movement, cause human harm or physical damage, or modify dashboard settings via vectors related to modification of entertainment-system firmware and access of the CAN bus due to insufficient "Radio security protection," as demonstrated on a 2014 Jeep Cherokee Limited FWD.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.3/10
Exploit Score 6.5/10
Access Vector Adjacent_network
Access Complexity Low
Authentication None
Impact Score 10/10
Confidentiality Impact Complete
Availability Impact Complete
Integrity Impact Complete
Vector String AV:A/AC:L/Au:N/C:C/I:C/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:fca:uconnect:*:*:*:*:*:*:*:* Yes - -
References

http://blog.fcanorthamerica.com/2015/07/22/unhacking-the-hacked-jeep/
http://media.fcanorthamerica.com/newsrelease.do?id=16827&mid=1
http://www.securityfocus.com/bid/75993
http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483033/RCAK-15V461-4967.pdf
http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483036/RCLRPT-15V461-9407.pdf
https://ics-cert.us-cert.gov/advisories/ICSA-15-260-01
https://twitter.com/0xcharlie/status/623171594349842433
https://twitter.com/0xcharlie/status/623195051296993280
https://twitter.com/0xcharlie/status/623258479730552832
https://www.youtube.com/watch?v=MK0SrxBC1xs&feature=youtu.be

CVE ID
CVE-2015-5611
Published
2015-07-21
Modified
2016-12-24
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.