Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32063: CWE-306 Missing Authentication for Critical Function in Bosch Infotainment system ECU

0
Medium
VulnerabilityCVE-2025-32063cvecve-2025-32063cwe-306
Published: Sun Feb 15 2026 (02/15/2026, 10:48:34 UTC)
Source: CVE Database V5
Vendor/Project: Bosch
Product: Infotainment system ECU

Description

There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vulnerability happens during the startup phase of a specific systemd service, and as a result, the following developer features will be activated: the disabled firewall and the launched SSH server. First identified on Nissan Leaf ZE1 manufactured in 2020.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 22:29:11 UTC

Technical Analysis

CVE-2025-32063 is a security vulnerability identified in the Bosch Infotainment system ECU, notably present in the Nissan Leaf ZE1 manufactured in 2020. The flaw arises from a misconfiguration during the startup phase of a specific systemd service within the ECU. This misconfiguration inadvertently activates developer features that are normally disabled in production environments: specifically, it disables the firewall and launches an SSH server without requiring authentication. This constitutes a CWE-306 (Missing Authentication for Critical Function) vulnerability, allowing unauthorized users to access critical system functions remotely. The vulnerability is exploitable without user interaction or prior authentication, but the attack vector is local or requires network proximity (CVSS vector AV:P). The impact is severe, as unauthorized access could lead to full compromise of the infotainment system, potentially affecting vehicle operation or exposing sensitive data. The CVSS score of 6.8 reflects medium severity with high confidentiality, integrity, and availability impacts. No patches or known exploits have been reported yet, but the presence of an open SSH server with disabled firewall significantly increases attack surface and risk. The vulnerability highlights the importance of secure configuration management in automotive ECUs, especially those connected to vehicle networks and external interfaces.

Potential Impact

The vulnerability allows an attacker with local or network proximity access to connect to the infotainment ECU via SSH without authentication, due to the disabled firewall and active SSH server. This unauthorized access can lead to full compromise of the infotainment system, enabling attackers to manipulate system settings, extract sensitive data, or potentially interfere with vehicle functions if the ECU interfaces with other vehicle control systems. The confidentiality of user data stored or processed by the infotainment system is at high risk. Integrity and availability of the system are also compromised, as attackers could modify or disrupt ECU operations. For organizations such as automotive manufacturers, fleet operators, and service providers, this vulnerability could lead to reputational damage, safety risks, and regulatory consequences. The medium CVSS score reflects that exploitation requires proximity, limiting remote mass exploitation but still posing significant risk in scenarios like public charging stations, dealerships, or service centers where attackers might gain network access.

Mitigation Recommendations

1. Immediate mitigation should focus on network segmentation: isolate the infotainment ECU network from external and less trusted networks to limit attacker access. 2. Disable or restrict SSH access on the ECU until a patch is available, using firewall rules or network controls. 3. Monitor network traffic for unexpected SSH connections or firewall disablement events. 4. Collaborate with Bosch and Nissan to obtain and apply official patches or firmware updates addressing the misconfiguration. 5. Implement strict configuration management and validation processes to prevent developer features from being enabled in production environments. 6. Conduct security audits and penetration testing on automotive ECUs to detect similar misconfigurations proactively. 7. Educate service personnel and users about the risks of connecting vehicles to untrusted networks or devices. 8. Employ intrusion detection systems capable of recognizing anomalous behavior on vehicle networks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASRG
Date Reserved
2025-04-03T15:32:43.282Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6991a7744b0e3abdf9520b45

Added to database: 2/15/2026, 11:01:08 AM

Last enriched: 2/22/2026, 10:29:11 PM

Last updated: 4/3/2026, 9:07:21 AM

Views: 175

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses