CVE-2025-32063: CWE-306 Missing Authentication for Critical Function in Bosch Infotainment system ECU
There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vulnerability happens during the startup phase of a specific systemd service, and as a result, the following developer features will be activated: the disabled firewall and the launched SSH server. First identified on Nissan Leaf ZE1 manufactured in 2020.
AI Analysis
Technical Summary
CVE-2025-32063 is a security vulnerability identified in the Bosch Infotainment system ECU, notably present in the Nissan Leaf ZE1 manufactured in 2020. The flaw arises from a misconfiguration during the startup phase of a specific systemd service within the ECU. This misconfiguration inadvertently activates developer features that are normally disabled in production environments: specifically, it disables the firewall and launches an SSH server without requiring authentication. This constitutes a CWE-306 (Missing Authentication for Critical Function) vulnerability, allowing unauthorized users to access critical system functions remotely. The vulnerability is exploitable without user interaction or prior authentication, but the attack vector is local or requires network proximity (CVSS vector AV:P). The impact is severe, as unauthorized access could lead to full compromise of the infotainment system, potentially affecting vehicle operation or exposing sensitive data. The CVSS score of 6.8 reflects medium severity with high confidentiality, integrity, and availability impacts. No patches or known exploits have been reported yet, but the presence of an open SSH server with disabled firewall significantly increases attack surface and risk. The vulnerability highlights the importance of secure configuration management in automotive ECUs, especially those connected to vehicle networks and external interfaces.
Potential Impact
The vulnerability allows an attacker with local or network proximity access to connect to the infotainment ECU via SSH without authentication, due to the disabled firewall and active SSH server. This unauthorized access can lead to full compromise of the infotainment system, enabling attackers to manipulate system settings, extract sensitive data, or potentially interfere with vehicle functions if the ECU interfaces with other vehicle control systems. The confidentiality of user data stored or processed by the infotainment system is at high risk. Integrity and availability of the system are also compromised, as attackers could modify or disrupt ECU operations. For organizations such as automotive manufacturers, fleet operators, and service providers, this vulnerability could lead to reputational damage, safety risks, and regulatory consequences. The medium CVSS score reflects that exploitation requires proximity, limiting remote mass exploitation but still posing significant risk in scenarios like public charging stations, dealerships, or service centers where attackers might gain network access.
Mitigation Recommendations
1. Immediate mitigation should focus on network segmentation: isolate the infotainment ECU network from external and less trusted networks to limit attacker access. 2. Disable or restrict SSH access on the ECU until a patch is available, using firewall rules or network controls. 3. Monitor network traffic for unexpected SSH connections or firewall disablement events. 4. Collaborate with Bosch and Nissan to obtain and apply official patches or firmware updates addressing the misconfiguration. 5. Implement strict configuration management and validation processes to prevent developer features from being enabled in production environments. 6. Conduct security audits and penetration testing on automotive ECUs to detect similar misconfigurations proactively. 7. Educate service personnel and users about the risks of connecting vehicles to untrusted networks or devices. 8. Employ intrusion detection systems capable of recognizing anomalous behavior on vehicle networks.
Affected Countries
United States, Japan, Germany, United Kingdom, France, Canada, Australia, South Korea, China, Netherlands
CVE-2025-32063: CWE-306 Missing Authentication for Critical Function in Bosch Infotainment system ECU
Description
There is a misconfiguration vulnerability inside the Infotainment ECU manufactured by BOSCH. The vulnerability happens during the startup phase of a specific systemd service, and as a result, the following developer features will be activated: the disabled firewall and the launched SSH server. First identified on Nissan Leaf ZE1 manufactured in 2020.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-32063 is a security vulnerability identified in the Bosch Infotainment system ECU, notably present in the Nissan Leaf ZE1 manufactured in 2020. The flaw arises from a misconfiguration during the startup phase of a specific systemd service within the ECU. This misconfiguration inadvertently activates developer features that are normally disabled in production environments: specifically, it disables the firewall and launches an SSH server without requiring authentication. This constitutes a CWE-306 (Missing Authentication for Critical Function) vulnerability, allowing unauthorized users to access critical system functions remotely. The vulnerability is exploitable without user interaction or prior authentication, but the attack vector is local or requires network proximity (CVSS vector AV:P). The impact is severe, as unauthorized access could lead to full compromise of the infotainment system, potentially affecting vehicle operation or exposing sensitive data. The CVSS score of 6.8 reflects medium severity with high confidentiality, integrity, and availability impacts. No patches or known exploits have been reported yet, but the presence of an open SSH server with disabled firewall significantly increases attack surface and risk. The vulnerability highlights the importance of secure configuration management in automotive ECUs, especially those connected to vehicle networks and external interfaces.
Potential Impact
The vulnerability allows an attacker with local or network proximity access to connect to the infotainment ECU via SSH without authentication, due to the disabled firewall and active SSH server. This unauthorized access can lead to full compromise of the infotainment system, enabling attackers to manipulate system settings, extract sensitive data, or potentially interfere with vehicle functions if the ECU interfaces with other vehicle control systems. The confidentiality of user data stored or processed by the infotainment system is at high risk. Integrity and availability of the system are also compromised, as attackers could modify or disrupt ECU operations. For organizations such as automotive manufacturers, fleet operators, and service providers, this vulnerability could lead to reputational damage, safety risks, and regulatory consequences. The medium CVSS score reflects that exploitation requires proximity, limiting remote mass exploitation but still posing significant risk in scenarios like public charging stations, dealerships, or service centers where attackers might gain network access.
Mitigation Recommendations
1. Immediate mitigation should focus on network segmentation: isolate the infotainment ECU network from external and less trusted networks to limit attacker access. 2. Disable or restrict SSH access on the ECU until a patch is available, using firewall rules or network controls. 3. Monitor network traffic for unexpected SSH connections or firewall disablement events. 4. Collaborate with Bosch and Nissan to obtain and apply official patches or firmware updates addressing the misconfiguration. 5. Implement strict configuration management and validation processes to prevent developer features from being enabled in production environments. 6. Conduct security audits and penetration testing on automotive ECUs to detect similar misconfigurations proactively. 7. Educate service personnel and users about the risks of connecting vehicles to untrusted networks or devices. 8. Employ intrusion detection systems capable of recognizing anomalous behavior on vehicle networks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ASRG
- Date Reserved
- 2025-04-03T15:32:43.282Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6991a7744b0e3abdf9520b45
Added to database: 2/15/2026, 11:01:08 AM
Last enriched: 2/22/2026, 10:29:11 PM
Last updated: 4/3/2026, 9:07:21 AM
Views: 175
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.