Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug

Redazione RHC : 20 July 2025 20:57

Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy’s Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code and could contribute to accessing critical components in vehicles from manufacturers such as Mercedes-Benz AG, Volkswagen, and Škoda. OpenSynergy confirmed the issues in June 2024 and released patches in September. However, many car manufacturers have not yet implemented the updates in their firmware.

The vulnerabilities were discovered by specialists at PCA Cyber Security, a company specializing in automotive security. It’s important to note that the company regularly participates in the Pwn2Own Automotive competition and has discovered more than 50 bugs in various automotive systems since last year. According to researchers, PerfektBlue’s issues affect millions of devices in the automotive industry and beyond. However, the experts studied the compiled binary of BlueSDK, as they simply didn’t have the source code.

The vulnerabilities vary in severity and can allow access to the internal components of various vehicles via the infotainment system.

  • CVE-2024-45434 – Use after release in AVRCP service Responsible for managing Bluetooth media profiles.
  • CVE-2024-45431 – Incorrect validation of the CID channel identifier in L2CAP (Logical Link Control and Adaptation Protocol).
  • CVE-2024-45433 – Radio Frequency Communication Protocol (RFCOMM) function termination error.
  • CVE-2024-45432 – Invalid parameter passed when calling the RFCOMM function.

Although the researchers don’t disclose all the technical details, they write that an attacker connected to a vulnerable device has the ability to manipulate the system, escalate privileges, and escalate to other components. PerfektBlue is a 1-click RCE attack, because the attacker only needs to convince the user to accept the pairing request with their device. Some car manufacturers configure their systems so that pairing is possible even without confirmation.

PCA Cyber Security has demonstrated that PerfektBlue works with the head units of the Volkswagen ID.4 (ICSA3 system), Mercedes-Benz (NTG6), and Skoda Superb (MIB3).

Rear shell for Mercedes-Benz NTG6

It is noted that after remote code execution in the context of the car’s infotainment system, an attacker can track GPS coordinates, eavesdrop on in-car conversations, access the owner’s phone contacts, and even perform lateral movements and reach critical car subsystems. OpenSynergy’s BlueSDK is widely used outside the automotive industry, but it is difficult to identify who else is using it in their products (due to customization, rebranding, and a lack of transparency).

Researchers have They informed Volkswagen, Mercedes-Benz, and Škoda of the problems encountered, giving them sufficient time to implement solutions. However, the experts never received a response from the automakers. Mercedes-Benz representatives did not respond to requests from journalists, and Volkswagen said it launched an investigation immediately after receiving information about the vulnerabilities. “The investigation has shown that under certain conditions, it is possible to connect to the vehicle’s infotainment system via Bluetooth without authorization,” Volkswagen said.

But the company emphasized that the exploit will only work if certain conditions are met:

  • The attacker is within a radius of 5-7 meters of the car;
  • The car’s dashboard is turned on;
  • The infotainment system is in pairing mode (the user manually initiated device addition);
  • The user confirms the connection of an external Bluetooth device on the screen.

Even if these conditions are met, the attacker must remain within 5-7 meters of the car during the attack to maintain access. The company separately noted that even in the event of a successful compromise, a hacker will not be able to compromise the car’s critical functions, including steering, driver assistance systems, engine operation, and braking system (which are controlled by a separate unit with its own protection mechanisms).

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli