Multiple vulnerabilities in Trailer Power Line Communications (PLC) J2497



Published: 2022-03-07
Risk Medium
Patch available NO
Number of vulnerabilities 2
CVE-ID CVE-2022-25922
CVE-2022-26131
CWE-ID CWE-306
CWE-1319
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
J2497
Other software / Other software solutions

Vendor SAE International

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Missing Authentication for Critical Function

EUVDB-ID: #VU61039

Risk: Low

CVSSv3.1: 5.6 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-25922

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows an attacker with pysical access to compromise the target system.

The vulnerability exists due to trailer brake controllers implement diagnostic functions which can be invoked by replaying J2497 messages.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

J2497: All versions

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-063-01


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Protection against Electromagnetic Fault Injection

EUVDB-ID: #VU61040

Risk: Medium

CVSSv3.1: 8.5 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-26131

CWE-ID: CWE-1319 - Improper Protection against Electromagnetic Fault Injection

Exploit availability: No

Description

The vulnerability allows a remote attacker on the local network to compromise the system.

The vulnerability exists due to the trailer power line communications J2497 (PLC4TRUCKS) receivers are susceptible to remote RF induced signals.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

J2497: All versions

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-063-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###