CVE-2024-51073: n/a
An issue in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to control or disrupt CAN communication between the instrument cluster and CAN bus. NOTE: this is disputed by the Supplier because the findings came from a potentially unrealistic test environment (an isolated ECU part that was not in a vehicle), and because the observed behavior follows the UDS (Unified Diagnostic Services) specification.
AI Analysis
Technical Summary
CVE-2024-51073 identifies a vulnerability in the instrument cluster of the KIA Seltos vehicle, specifically in software and hardware version 1.0. The instrument cluster interfaces with the vehicle's Controller Area Network (CAN) bus, which is critical for communication between various electronic control units (ECUs) in modern vehicles. The vulnerability allows an attacker to potentially control or disrupt CAN communication between the instrument cluster and the CAN bus. This could lead to manipulation or denial of service of vehicle functions that rely on CAN messages, potentially affecting vehicle safety and operational integrity. The findings stem from tests conducted on an isolated ECU component, not within a fully integrated vehicle environment, leading the supplier to dispute the vulnerability's practical exploitability. The observed behavior reportedly complies with the Unified Diagnostic Services (UDS) protocol, which governs diagnostic communication in vehicles. The CVSS 3.1 score of 6.7 reflects a medium severity, with attack vector classified as physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact includes low confidentiality and integrity loss but high availability impact, indicating potential denial of service or disruption of vehicle functions. No patches or known exploits are currently available, and the vulnerability was published on November 22, 2024.
Potential Impact
The potential impact of CVE-2024-51073 is significant for vehicle safety and reliability. If exploited, attackers could disrupt or manipulate CAN bus communication, potentially causing malfunctions in vehicle instrumentation, warning systems, or other critical electronic functions. This could lead to unsafe driving conditions, loss of driver information, or vehicle immobilization. For organizations, this vulnerability poses risks to automotive manufacturers, suppliers, dealerships, and fleet operators who rely on the affected KIA Seltos models. Disruption of vehicle systems could result in increased warranty claims, reputational damage, and regulatory scrutiny. Although exploitation requires physical access to the vehicle's CAN bus, sophisticated attackers or insiders could leverage this to cause targeted disruptions. The lack of known exploits in the wild reduces immediate risk, but the medium CVSS score and potential safety implications necessitate proactive attention.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify the applicability of the findings within real-world vehicle environments by collaborating with the supplier and conducting integrated vehicle testing. Monitoring CAN bus traffic for unusual or unauthorized messages can help detect attempted exploitation. Physical security controls should be enhanced to prevent unauthorized access to the vehicle's internal networks, including securing diagnostic ports and ECUs. Automotive service centers and fleet operators should be trained to recognize signs of CAN bus tampering or malfunction. The supplier should be engaged to provide firmware or software updates if further validation confirms the vulnerability. Additionally, implementing anomaly detection systems within vehicle networks and employing secure diagnostic protocols can reduce the risk of exploitation. Finally, maintaining an incident response plan for automotive cybersecurity events will help organizations respond effectively if exploitation occurs.
Affected Countries
South Korea, India, United States, Canada, Australia, United Kingdom, United Arab Emirates, Saudi Arabia, Russia, Brazil, Mexico
CVE-2024-51073: n/a
Description
An issue in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to control or disrupt CAN communication between the instrument cluster and CAN bus. NOTE: this is disputed by the Supplier because the findings came from a potentially unrealistic test environment (an isolated ECU part that was not in a vehicle), and because the observed behavior follows the UDS (Unified Diagnostic Services) specification.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-51073 identifies a vulnerability in the instrument cluster of the KIA Seltos vehicle, specifically in software and hardware version 1.0. The instrument cluster interfaces with the vehicle's Controller Area Network (CAN) bus, which is critical for communication between various electronic control units (ECUs) in modern vehicles. The vulnerability allows an attacker to potentially control or disrupt CAN communication between the instrument cluster and the CAN bus. This could lead to manipulation or denial of service of vehicle functions that rely on CAN messages, potentially affecting vehicle safety and operational integrity. The findings stem from tests conducted on an isolated ECU component, not within a fully integrated vehicle environment, leading the supplier to dispute the vulnerability's practical exploitability. The observed behavior reportedly complies with the Unified Diagnostic Services (UDS) protocol, which governs diagnostic communication in vehicles. The CVSS 3.1 score of 6.7 reflects a medium severity, with attack vector classified as physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact includes low confidentiality and integrity loss but high availability impact, indicating potential denial of service or disruption of vehicle functions. No patches or known exploits are currently available, and the vulnerability was published on November 22, 2024.
Potential Impact
The potential impact of CVE-2024-51073 is significant for vehicle safety and reliability. If exploited, attackers could disrupt or manipulate CAN bus communication, potentially causing malfunctions in vehicle instrumentation, warning systems, or other critical electronic functions. This could lead to unsafe driving conditions, loss of driver information, or vehicle immobilization. For organizations, this vulnerability poses risks to automotive manufacturers, suppliers, dealerships, and fleet operators who rely on the affected KIA Seltos models. Disruption of vehicle systems could result in increased warranty claims, reputational damage, and regulatory scrutiny. Although exploitation requires physical access to the vehicle's CAN bus, sophisticated attackers or insiders could leverage this to cause targeted disruptions. The lack of known exploits in the wild reduces immediate risk, but the medium CVSS score and potential safety implications necessitate proactive attention.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify the applicability of the findings within real-world vehicle environments by collaborating with the supplier and conducting integrated vehicle testing. Monitoring CAN bus traffic for unusual or unauthorized messages can help detect attempted exploitation. Physical security controls should be enhanced to prevent unauthorized access to the vehicle's internal networks, including securing diagnostic ports and ECUs. Automotive service centers and fleet operators should be trained to recognize signs of CAN bus tampering or malfunction. The supplier should be engaged to provide firmware or software updates if further validation confirms the vulnerability. Additionally, implementing anomaly detection systems within vehicle networks and employing secure diagnostic protocols can reduce the risk of exploitation. Finally, maintaining an incident response plan for automotive cybersecurity events will help organizations respond effectively if exploitation occurs.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ba8b7ef31ef0b5579cd
Added to database: 2/25/2026, 9:37:44 PM
Last enriched: 2/28/2026, 2:45:43 AM
Last updated: 4/12/2026, 10:46:33 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.