CVE-2022-38766

The remote keyless system on Renault ZOE 2021 vehicles sends 433.92 MHz RF signals from the same Rolling Codes set for each door-open request, which allows for a replay attack.
References
Link Resource
https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 Exploit Third Party Advisory
https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:renault:zoe_e-tech_firmware:2021:*:*:*:*:*:*:*
cpe:2.3:h:renault:zoe_e-tech:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:17

Type Values Removed Values Added
Summary
  • (es) El sistema remoto sin llave de los vehículos Renault ZOE 2021 envía señales RF de 433,92 MHz desde los mismos Rolling Codes configurados para cada solicitud de apertura de puerta, lo que permite un ataque de repetición.
References () https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 - Exploit, Third Party Advisory () https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 - Exploit, Third Party Advisory

Information

Published : 2023-01-03 15:15

Updated : 2024-11-21 07:17


NVD link : CVE-2022-38766

Mitre link : CVE-2022-38766

CVE.ORG link : CVE-2022-38766


JSON object : View

Products Affected

renault

  • zoe_e-tech_firmware
  • zoe_e-tech
CWE
CWE-294

Authentication Bypass by Capture-replay