Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32058: CWE-121: Stack-based Buffer Overflow in Bosch Infotainment system ECU

0
Critical
VulnerabilityCVE-2025-32058cvecve-2025-32058cwe-121
Published: Sun Feb 15 2026 (02/15/2026, 10:44:48 UTC)
Source: CVE Database V5
Vendor/Project: Bosch
Product: Infotainment system ECU

Description

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the V850 side which allows an attacker with code execution on the infotainment main SoC to perform code execution on the RH850 module and subsequently send arbitrary CAN messages over the connected CAN bus. First identified on Nissan Leaf ZE1 manufactured in 2020.

AI-Powered Analysis

AILast updated: 02/15/2026, 11:16:09 UTC

Technical Analysis

CVE-2025-32058 is a stack-based buffer overflow vulnerability (CWE-121) found in the Bosch Infotainment system ECU, which integrates an RH850 microcontroller module responsible for CAN bus communication. The RH850 module interfaces with the infotainment main SoC via a custom INC protocol. The vulnerability arises during the processing of protocol requests on the V850 side, allowing an attacker who has already gained code execution on the infotainment main SoC to escalate privileges and execute arbitrary code on the RH850 module. This escalation enables the attacker to send arbitrary CAN messages over the vehicle's CAN bus, potentially manipulating critical vehicle functions such as braking, steering, or engine control. The flaw was first identified in the Nissan Leaf ZE1 model manufactured in 2020, indicating that affected vehicles have been in circulation for several years. The vulnerability has a CVSS v3.1 score of 9.3 (critical), with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), reflecting that the vulnerability affects components beyond the initially compromised system. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), underscoring the potential for severe consequences if exploited. No known exploits have been reported in the wild yet, and no patches are currently linked, emphasizing the need for proactive mitigation. The vulnerability highlights the risks inherent in interconnected automotive ECUs, especially those bridging infotainment systems and critical vehicle control networks.

Potential Impact

For European organizations, particularly automotive manufacturers, suppliers, and fleet operators, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control over vehicle functions, resulting in safety hazards, potential accidents, and loss of life. The ability to send arbitrary CAN messages can disrupt vehicle operation, compromise data confidentiality, and damage brand reputation. Regulatory compliance risks also arise, as European Union regulations on automotive cybersecurity and safety (e.g., UNECE WP.29) require manufacturers to address such vulnerabilities promptly. Additionally, the presence of this vulnerability in widely used electric vehicles like the Nissan Leaf ZE1 means that repair shops, dealerships, and end-users across Europe could be affected. The potential for remote exploitation is limited due to the local attack vector, but physical or network access to the infotainment system could be leveraged by attackers, including insiders or through compromised infotainment apps. The impact extends to connected vehicle ecosystems, where compromised CAN bus messages could propagate risks to broader transportation infrastructure.

Mitigation Recommendations

1. Bosch and affected OEMs should prioritize developing and distributing firmware patches for the infotainment ECU and RH850 module to eliminate the buffer overflow vulnerability. 2. Until patches are available, restrict physical and network access to the infotainment system by disabling unnecessary interfaces (e.g., USB, Bluetooth, Wi-Fi) and enforcing strict access controls. 3. Implement runtime integrity checks and anomaly detection on the CAN bus to identify and block unauthorized or suspicious messages indicative of exploitation attempts. 4. Employ secure coding practices and rigorous protocol validation in future infotainment and ECU software to prevent similar buffer overflow issues. 5. Conduct thorough security audits and penetration testing on vehicle infotainment systems, focusing on inter-module communication protocols like INC. 6. Educate dealership and maintenance personnel about the risks and signs of infotainment system compromise. 7. Collaborate with automotive cybersecurity information sharing organizations in Europe to monitor emerging threats and share mitigation strategies. 8. Encourage end-users to update vehicle software promptly once patches are released and avoid installing untrusted infotainment applications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ASRG
Date Reserved
2025-04-03T15:32:43.281Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6991a7744b0e3abdf9520b2c

Added to database: 2/15/2026, 11:01:08 AM

Last enriched: 2/15/2026, 11:16:09 AM

Last updated: 2/21/2026, 12:13:53 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats