An issue was discovered on Vgate iCar 2 Wi-Fi OBD2 Dongle devices. The OBD port is used to receive measurement data and debug information from the car. This on-board diagnostics feature can also be used to send commands to the car (different for every vendor / car product line / car). No authentication is needed, which allows attacks from the local Wi-Fi network.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/May/66 | Mailing List Third Party Advisory |
https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ | Third Party Advisory |
http://seclists.org/fulldisclosure/2018/May/66 | Mailing List Third Party Advisory |
https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2018/May/66 - Mailing List, Third Party Advisory | |
References | () https://www.sec-consult.com/en/blog/advisories/unprotected-wifi-access-unencrypted-data-transfer-in-vgate-icar2-wifi-obd2-dongle/ - Third Party Advisory |
Information
Published : 2018-05-30 21:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11478
Mitre link : CVE-2018-11478
CVE.ORG link : CVE-2018-11478
JSON object : View
Products Affected
vgate
- icar_2_wi-fi_obd2
- icar_2_wi-fi_obd2_firmware
CWE
CWE-287
Improper Authentication