The update functionality of the Discover Media infotainment system in Volkswagen Polo 2019 vehicles allows physically proximate attackers to execute arbitrary code because some unsigned parts of a metainfo file are parsed, which can cause attacker-controlled files to be written to the infotainment system and executed as root.
References
Link | Resource |
---|---|
https://www.contextis.com/en/blog/a-code-signing-bypass-for-the-vw-polo | Exploit Third Party Advisory |
https://www.contextis.com/en/blog/a-code-signing-bypass-for-the-vw-polo | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.contextis.com/en/blog/a-code-signing-bypass-for-the-vw-polo - Exploit, Third Party Advisory |
Information
Published : 2020-11-16 04:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-28656
Mitre link : CVE-2020-28656
CVE.ORG link : CVE-2020-28656
JSON object : View
Products Affected
vw
- polo_firmware
- polo
CWE
CWE-354
Improper Validation of Integrity Check Value