[Japanese]

JVNDB-2020-002957

A vulnerability in TOYOTA MOTOR's DCU (Display Control Unit)

Overview

TOYOTA MOTOR's DCU contains a vulnerability which is triggered by BlueBorne vulnerability.

TOYOTA MOTER CORPORATION reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 8.2 (High) [IPA Score]
  • Attack Vector: Adjacent Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: None
  • Scope: Changed
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: Low
CVSS V2 Severity:
Base Metrics 6.5 (Medium) [IPA Score]
  • Access Vector: Adjacent Network
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: Complete
  • Integrity Impact: Complete
  • Availability Impact: Partial
Affected Products


TOYOTA MOTOR CORPORATION
  • Display Control Unit

2017 Model Year DCUs are affected.
These DCUs are mounted on the vehicles listed below:

* Vehicle: LC, LS, NX, RC, RC-F, CAMRY, SIENNA
* The period of time: October 2016 to October 2019
* Region: Worldwide regions except Japan

For details, refer to [Vendor Status].
Impact

An unauthenticated attacker may cause a denial of service (DoS) condition or execute an arbitrary command on the DCU.
Certain vehicle operations may be conducted via DCU.
According to the developer, critical vehicle controls such as driving, turning, and stopping are not affected.

For details, refer to the information under [Vendor Status] and [References].
Solution

[Update DCU]
The developer states that the update fixing this vulnerability is available.

For the details, refer to [Vendor Status].
Vendor Information

TOYOTA MOTOR CORPORATION
CWE (What is CWE?)

  1. Incorrect Default Permissions(CWE-276) [NVD Evaluation]
CVE (What is CVE?)

  1. CVE-2020-5551
References

  1. JVN : JVNVU#99396686
  2. National Vulnerability Database (NVD) : CVE-2020-5551
  3. US-CERT Vulnerability Note : VU#240311
  4. Related document : Tencent Keen Security Lab
Revision History

  • [2024/08/20]
      Web page was published