Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32058: CWE-121: Stack-based Buffer Overflow in Bosch Infotainment system ECU

0
Critical
VulnerabilityCVE-2025-32058cvecve-2025-32058cwe-121
Published: Sun Feb 15 2026 (02/15/2026, 10:44:48 UTC)
Source: CVE Database V5
Vendor/Project: Bosch
Product: Infotainment system ECU

Description

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the V850 side which allows an attacker with code execution on the infotainment main SoC to perform code execution on the RH850 module and subsequently send arbitrary CAN messages over the connected CAN bus. First identified on Nissan Leaf ZE1 manufactured in 2020.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 22:26:47 UTC

Technical Analysis

CVE-2025-32058 is a stack-based buffer overflow vulnerability (CWE-121) discovered in the Bosch Infotainment system ECU, which integrates an RH850 microcontroller module responsible for CAN bus communication. The RH850 module communicates with the infotainment main SoC via a custom protocol over the INC interface. The vulnerability exists in the request processing logic on the RH850 side, where improper bounds checking allows a buffer overflow when handling specially crafted protocol requests. Exploitation requires the attacker to have prior code execution on the infotainment main SoC, which is a prerequisite to trigger the overflow on the RH850 module. Successful exploitation enables arbitrary code execution on the RH850, allowing the attacker to send arbitrary CAN messages over the vehicle's CAN bus. This capability can be leveraged to manipulate critical vehicle functions controlled via CAN, such as braking, steering, or engine management, potentially leading to dangerous scenarios. The vulnerability was first identified in the Nissan Leaf ZE1 model manufactured in 2020, indicating real-world deployment. The CVSS v3.1 score of 9.3 reflects the critical nature of the flaw, with low attack complexity, no privileges required, no user interaction, and a scope change affecting multiple components. No public exploits or patches are currently available, highlighting the need for proactive mitigation and monitoring.

Potential Impact

The impact of CVE-2025-32058 is severe for automotive manufacturers, suppliers, and end-users. Exploitation can lead to full compromise of the RH850 module controlling CAN bus communications, enabling attackers to inject arbitrary CAN messages. This can result in unauthorized control over vehicle subsystems such as braking, acceleration, steering, and other safety-critical functions, posing significant safety risks to drivers and passengers. The confidentiality of vehicle data can be compromised, and integrity and availability of vehicle control systems can be severely disrupted. For organizations, this vulnerability threatens brand reputation, regulatory compliance, and could lead to costly recalls or legal liabilities. The requirement for prior code execution on the infotainment main SoC means attackers must first breach infotainment security, but once achieved, the attack surface expands dramatically. The vulnerability affects vehicles using Bosch infotainment ECUs with the RH850 module, notably Nissan Leaf ZE1 models from 2020, but potentially other vehicles using similar hardware and software architectures. The lack of available patches increases the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2025-32058, organizations should implement a multi-layered approach: 1) Apply any available Bosch or OEM patches promptly once released; 2) Restrict and harden access to the infotainment main SoC to prevent initial code execution, including disabling unnecessary interfaces and services, enforcing strict authentication, and applying secure boot and runtime integrity checks; 3) Employ network segmentation within the vehicle architecture to isolate the infotainment system from critical CAN bus domains, limiting the impact of a compromised infotainment ECU; 4) Monitor CAN bus traffic for anomalous or unauthorized messages that could indicate exploitation attempts; 5) Collaborate with Bosch and automotive OEMs to conduct thorough security assessments and penetration testing of infotainment systems; 6) For fleet operators, implement intrusion detection systems tailored for automotive networks and maintain up-to-date incident response plans specific to vehicle cybersecurity; 7) Educate end-users on the risks of connecting untrusted devices or software to infotainment systems to reduce attack vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASRG
Date Reserved
2025-04-03T15:32:43.281Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6991a7744b0e3abdf9520b2c

Added to database: 2/15/2026, 11:01:08 AM

Last enriched: 2/22/2026, 10:26:47 PM

Last updated: 4/5/2026, 5:59:32 AM

Views: 218

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses