CVE-2025-32062
Plain English Summary
AI-powered analysis for quick understanding
An attacker can gain full control over the car's infotainment system by exploiting a flaw in the Bluetooth software, allowing them to run malicious code remotely. This vulnerability requires the attacker to send a specially crafted Bluetooth packet to the system while it is connected to the L2CAP channel.
Technical Description
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote code execution on the Infotainment ECU with root privileges. First identified on Nissan Leaf ZE1 manufactured in 2020.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 15, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago