Lucene search

K
kitploitKitPloitKITPLOIT:3452017619644607094
HistoryMar 30, 2022 - 8:30 p.m.

CVE-2022-27254 - PoC For Vulnerability In Honda's Remote Keyless System

2022-03-3020:30:00
www.kitploit.com
126

2.9 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:A/AC:M/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

51.5%

PoC for vulnerability in Honda’s Remote Keyless System(CVE-2022-27254)

Disclaimer:

For educational purposes only. Kindly note that the discoverers for this vulnerability are Ayyappan Rajesh, a student at UMass Dartmouth and HackingIntoYourHeart.

Others mentioned in this repository are credited for the support that they have provided but have played no active role in any research conducted related to this finding. If looking to publish these findings elsewhere, please refrain from associating this with any other persons, companies or institutions without any explicit approval.

Summary:

This is a proof of concept for CVE-2022-27254, wherein the remote keyless system on various Honda vehicles send the same, unencrypted RF signal for each door-open, door-close, boot-open and remote start(if applicable). This allows for an attacker to eavesdrop on the request and conduct a replay attack.

POC videos

Vehicles Affected:

• 2016-2020 Honda Civic(LX, EX, EX-L, Touring, Si, Type R)

Important Notes:

 •Key fob FCC ID: KR5V2X  
  
 •Key fob frequency: 433.215MHz  
  
 •Key fob modulation: FSK  

Tools used:

       •FCCID.io  
       •HackRF One  
       •Gqrx  
       •GNURadio  

Prevention:

  • Manufacturers:

    1. Manufacturers must implement Rolling Codes, otherwise known as hopping code. It is a security technology commonly used to provide a fresh code for each authentication of a remote keyless entry (RKE) or passive keyless entry (PKE) system.
  • Consumers:

    1. Utilize a Faraday Pouch for the key fob.
    2. Use the PKE as opposed to the RKE, this would make it significantly harder for an attacker to clone/read the signal due to the proximity they would need to be at to do so.

The precautions mentioned above ARE NOT foolproof

If you believe that you are a victim of this attack, the only current mitigation is to reset your key fob at the dealership.

Credits:

Ayyappan Rajesh(nonamecoder)

HackingIntoYourHeart

Special thanks to:

• My professor :Prof. Hong Liu

• My mentor:Sam Curry

•My professor :Prof. Ruolin Zhou

References:

•<https://www.youtube.com/watch?v=1RipwqJG50c&gt;

•<https://attack.mitre.org/techniques/T1040/&gt;

Download CVE-2022-27254

2.9 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:A/AC:M/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

51.5%

Related for KITPLOIT:3452017619644607094