The remote keyfob system on Nissan Sylphy Classic 2021 sends the same RF signal for each door-open request, which allows for a replay attack. NOTE: the vendor's position is that this cannot be reproduced with genuine Nissan parts: for example, the combination of keyfob and door handle shown in the exploit demonstration does not match any technology that Nissan provides to customers.
References
Link | Resource |
---|---|
https://chaos-lab.blogspot.com/2023/05/nissan-sylphy-classic-2021-fixed-code.html | Exploit Third Party Advisory |
https://twitter.com/Kevin2600/status/1658059570806415365 | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=GG1utSdYG1k | Exploit Third Party Advisory |
https://chaos-lab.blogspot.com/2023/05/nissan-sylphy-classic-2021-fixed-code.html | Exploit Third Party Advisory |
https://twitter.com/Kevin2600/status/1658059570806415365 | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=GG1utSdYG1k | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-05-22 02:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33281
Mitre link : CVE-2023-33281
CVE.ORG link : CVE-2023-33281
JSON object : View
Products Affected
nissan
- sylphy_classic_2021_firmware
- sylphy_classic_2021
CWE
CWE-294
Authentication Bypass by Capture-replay