Summary
| Severity | High |
| CVSS Score | 8.0 |
| CVEs | CVE-2024-45431, CVE-2024-45432, CVE-2024-45433, CVE-2024-45434, |
| Actively Exploited | No |
| Exploited in Wild | No |
| Advisory Version | 1.0 |
Overview
Researchers discovered critical Bluetooth flaws, called PerfektBlue, in the OpenSynergy BlueSDK stack used in millions of vehicles. These allow attackers nearby to remotely run malicious code through the infotainment system, potentially accessing GPS, audio and even vehicle controls depending on the car’s design.
Cars from brands like Mercedes-Benz, Volkswagen and Skoda are affected. While patches were released, it is urged to update the systems and stay cautious during Bluetooth pairing to stay protected.
| Vulnerability Name | CVE ID | Product Affected | Severity |
| Use-After-Free in AVRCP | CVE-2024-45434 | Open Synergy BlueSDK (Bluetooth AVRCP service_ | 8.0 |
| RFCOMM Improper Function Termination | CVE-2024-45433 | OpenSynergy BlueSDK (Bluetooth RFCOMM protocol) | 5.7 |
| RFCOMM Parameter Misuse | CVE-2024-45432 | OpenSynergy BlueSDK (Bluetooth RFCOMM protocol) | 5.7 |
| L2CAP Remote CID Validation Flaw | CVE-2024-45431 | OpenSynergy BlueSDK (Bluetooth L2CAP layer) | 3.5 |
Technical Summary
A set of vulnerabilities has been identified in the Bluetooth stack of infotainment systems, affecting core protocols like AVRCP, L2CAP, and RFCOMM. These issues stem from improper memory handling, incorrect parameter usage and flawed validation logic. While some may only cause system instability or crashes, they can be combined in a coordinated attack to bypass defenses, disrupt communication or potentially execute code remotely. Overall, they expose critical weaknesses that could be exploited to compromise the system through crafted Bluetooth traffic.
| CVE ID | System Affected | Vulnerability Details | Impact |
| CVE-2024-45434 | Vehicles using Open Synergy Blue SDK, including Mercedes-Benz, Volkswagen, Skoda and undisclosed OEM. | This vulnerability allows attackers to exploit free memory in the AVRCP service. By sending crafted Bluetooth commands, they can trigger a use-after-free condition, potentially leading to crashes or remote code execution inside the infotainment system. It can be part of a larger attack chain to take over the system. | May allow attackers to run remote code on the infotainment system. |
| CVE-2024-45433 | Automotive systems running Blue SDK’s RFCOMM protocol implementation. | Due to faulty logic in RFCOMM, certain functions may not exist properly. This can cause the system to behave unpredictably, giving attackers a chance to manipulate control flow or trigger crashes. It can be used to stabilize or advance remote attacks on the Bluetooth stack. | May cause system crash or help in running further malicious actions. |
| CVE-2024-45432 | Vehicles using Open Synergy Blue SDK with Bluetooth RFCOMM services. | This issue involves functions in the RFCOMM protocol being called with wrong parameters. Attackers can exploit this to introduce unexpected behavior or weaken Bluetooth processing. On its own, it may cause a crash, but as part of an exploit chain, it helps attackers gain deeper access. | Can create logic errors and make the system unstable. |
| CVE-2024-45431 | Infotainment systems in vehicles using Open Synergy Blue SDK Bluetooth stack. | This flaw stems from incorrect validation of channel IDs in the L2CAP layer. Attackers can send malformed Bluetooth packets that bypass checks, possibly disrupting communication or preparing the system for further exploitation. Though low in severity alone, it can support chained attacks. | Could help attackers bypass checks |
Remediation:
To stay protected from the PerfektBlue vulnerabilities, users should update with the available latest patches provided by the manufacturer ensure once their vehicle’s software is fully updated.
Here are some best practices below you can follow
Conclusion:
The PerfektBlue flaws show that even car Bluetooth systems can be a way for hackers to attack. If not fixed, these issues can let attackers take control of your car’s infotainment features and maybe more. Timely patching and adopting secure Bluetooth practices are essential to minimize exposure. As vehicles grow increasingly connected, securing their wireless interfaces becomes crucial to maintaining overall system safety and privacy.
References:
Recent Comments