6.9
CVSSv2

CVE-2018-18203

Published: 28/11/2018 Updated: 05/02/2019
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.4 | Impact Score: 5.9 | Exploitability Score: 0.5
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the update mechanism of Subaru StarLink Harman head units 2017, 2018, and 2019 may give an attacker (with physical access to the vehicle's USB ports) the ability to rewrite the firmware of the head unit. This occurs because the device accepts modified QNX6 filesystem images (as long as the attacker obtains access to certain Harman decryption/encryption code) as a consequence of a bug where unsigned images pass a validity check. An attacker could potentially install persistent malicious head unit firmware and execute arbitrary code as the root user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

subaru starlink_2017_firmware -

subaru starlink_2018_firmware -

subaru starlink_2019_firmware -

Github Repositories

Subaru StarLink persistent root code execution.

Jailbreaking Subaru StarLink Rooting the latest generation of Harman head units running on newer Subaru vehicles See doc/READMEmd for the write-up CVE-2018-18203 A vulnerability in the update mechanism of Subaru StarLink head units 2017, 2018, and 2019 may give an attacker (with physical access to the vehicle's USB ports) the ability to rewrite the firmware of the head