CVE-2025-32059

Plain English Summary

AI-powered analysis for quick understanding

An attacker can gain complete control over the car's infotainment system by exploiting a flaw in the Bluetooth software, allowing them to run malicious code remotely. This vulnerability requires the attacker to send a specially crafted Bluetooth packet to the system while it is connected.

Technical Description

The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote code execution on the Infotainment ECU with root privileges. First identified on Nissan Leaf ZE1 manufactured in 2020.

CVSS Vector Analysis

Attack VectorAdjacent Network
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Feb 15, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago