CVE-2024-51072: n/a
An issue in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to cause a Denial of Service (DoS) via ECU reset UDS service. NOTE: this is disputed by the Supplier because the findings came from a potentially unrealistic test environment (an isolated ECU part that was not in a vehicle), and because the ECUReset specification does not allow a manufacturer to require SecurityAccess and Authentication.
AI Analysis
Technical Summary
CVE-2024-51072 identifies a vulnerability in the instrument cluster ECU of the KIA Seltos vehicle, specifically in software and hardware version 1.0. The issue involves the UDS (Unified Diagnostic Services) protocol's ECUReset service, which can be invoked by an attacker to cause a Denial of Service (DoS) by resetting the ECU, thereby disrupting the instrument cluster's operation. The vulnerability is notable because the ECUReset service does not require SecurityAccess or authentication, allowing unauthenticated attackers to trigger the reset. This lack of authentication is classified under CWE-346 (Origin Validation Error). However, the supplier disputes the vulnerability's validity, arguing that the test environment was unrealistic—testing an isolated ECU outside the vehicle context—and that the ECUReset specification does not permit manufacturers to require authentication, implying the behavior is by design or constrained by standards. The CVSS 3.1 base score is 5.3, with vector AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H, indicating the attack requires physical proximity (AV:P), low attack complexity, no privileges or user interaction, and impacts availability with a scope change. No patches or mitigations have been published yet, and no known exploits are reported in the wild. This vulnerability highlights potential risks in automotive ECUs where diagnostic services may be exposed without sufficient authentication controls.
Potential Impact
The primary impact of CVE-2024-51072 is a Denial of Service condition on the KIA Seltos instrument cluster, which could disable or disrupt critical vehicle dashboard functions such as speedometer, fuel gauge, warning lights, and other driver information displays. This can lead to driver confusion or distraction, potentially increasing the risk of accidents. Although the vulnerability does not affect confidentiality or integrity, the loss of availability of the instrument cluster is significant for vehicle safety and operational awareness. The requirement for physical or local network access limits remote exploitation but does not eliminate risk, especially in scenarios where attackers gain proximity or access to the vehicle's diagnostic interface (e.g., during maintenance or via compromised telematics). The disputed nature of the vulnerability and lack of known exploits reduce immediate risk, but the potential for misuse in targeted attacks or by malicious insiders remains. Organizations operating fleets of KIA Seltos vehicles or related automotive service providers should consider the operational impact of instrument cluster DoS and prepare for incident response. The absence of patches means mitigation relies on access controls and monitoring.
Mitigation Recommendations
1. Restrict physical and network access to the vehicle's diagnostic interfaces, especially the UDS protocol endpoints, by implementing strict access controls and secure storage of diagnostic tools. 2. Employ network segmentation within the vehicle's internal network (CAN bus or Ethernet) to isolate the instrument cluster ECU from external or less trusted components. 3. Monitor vehicle diagnostic communication for unusual ECUReset requests or repeated reset attempts that could indicate exploitation attempts. 4. Coordinate with KIA and authorized dealers to stay informed about any forthcoming firmware updates or patches addressing this vulnerability. 5. For fleet operators, implement policies to control and log all maintenance and diagnostic activities to detect unauthorized access. 6. Consider additional physical security measures to prevent unauthorized access to the vehicle's OBD-II port or telematics units. 7. Engage with automotive cybersecurity specialists to assess the risk in the specific operational environment and develop tailored detection and response strategies. 8. Advocate for future ECU and UDS protocol implementations to enforce authentication and authorization on critical diagnostic services such as ECUReset to prevent unauthenticated resets.
Affected Countries
South Korea, United States, Canada, United Kingdom, Germany, Australia, India, United Arab Emirates, Saudi Arabia, Russia
CVE-2024-51072: n/a
Description
An issue in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to cause a Denial of Service (DoS) via ECU reset UDS service. NOTE: this is disputed by the Supplier because the findings came from a potentially unrealistic test environment (an isolated ECU part that was not in a vehicle), and because the ECUReset specification does not allow a manufacturer to require SecurityAccess and Authentication.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-51072 identifies a vulnerability in the instrument cluster ECU of the KIA Seltos vehicle, specifically in software and hardware version 1.0. The issue involves the UDS (Unified Diagnostic Services) protocol's ECUReset service, which can be invoked by an attacker to cause a Denial of Service (DoS) by resetting the ECU, thereby disrupting the instrument cluster's operation. The vulnerability is notable because the ECUReset service does not require SecurityAccess or authentication, allowing unauthenticated attackers to trigger the reset. This lack of authentication is classified under CWE-346 (Origin Validation Error). However, the supplier disputes the vulnerability's validity, arguing that the test environment was unrealistic—testing an isolated ECU outside the vehicle context—and that the ECUReset specification does not permit manufacturers to require authentication, implying the behavior is by design or constrained by standards. The CVSS 3.1 base score is 5.3, with vector AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H, indicating the attack requires physical proximity (AV:P), low attack complexity, no privileges or user interaction, and impacts availability with a scope change. No patches or mitigations have been published yet, and no known exploits are reported in the wild. This vulnerability highlights potential risks in automotive ECUs where diagnostic services may be exposed without sufficient authentication controls.
Potential Impact
The primary impact of CVE-2024-51072 is a Denial of Service condition on the KIA Seltos instrument cluster, which could disable or disrupt critical vehicle dashboard functions such as speedometer, fuel gauge, warning lights, and other driver information displays. This can lead to driver confusion or distraction, potentially increasing the risk of accidents. Although the vulnerability does not affect confidentiality or integrity, the loss of availability of the instrument cluster is significant for vehicle safety and operational awareness. The requirement for physical or local network access limits remote exploitation but does not eliminate risk, especially in scenarios where attackers gain proximity or access to the vehicle's diagnostic interface (e.g., during maintenance or via compromised telematics). The disputed nature of the vulnerability and lack of known exploits reduce immediate risk, but the potential for misuse in targeted attacks or by malicious insiders remains. Organizations operating fleets of KIA Seltos vehicles or related automotive service providers should consider the operational impact of instrument cluster DoS and prepare for incident response. The absence of patches means mitigation relies on access controls and monitoring.
Mitigation Recommendations
1. Restrict physical and network access to the vehicle's diagnostic interfaces, especially the UDS protocol endpoints, by implementing strict access controls and secure storage of diagnostic tools. 2. Employ network segmentation within the vehicle's internal network (CAN bus or Ethernet) to isolate the instrument cluster ECU from external or less trusted components. 3. Monitor vehicle diagnostic communication for unusual ECUReset requests or repeated reset attempts that could indicate exploitation attempts. 4. Coordinate with KIA and authorized dealers to stay informed about any forthcoming firmware updates or patches addressing this vulnerability. 5. For fleet operators, implement policies to control and log all maintenance and diagnostic activities to detect unauthorized access. 6. Consider additional physical security measures to prevent unauthorized access to the vehicle's OBD-II port or telematics units. 7. Engage with automotive cybersecurity specialists to assess the risk in the specific operational environment and develop tailored detection and response strategies. 8. Advocate for future ECU and UDS protocol implementations to enforce authentication and authorization on critical diagnostic services such as ECUReset to prevent unauthenticated resets.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ba8b7ef31ef0b5579c8
Added to database: 2/25/2026, 9:37:44 PM
Last enriched: 2/28/2026, 2:45:29 AM
Last updated: 4/12/2026, 1:39:33 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.