CVE-2023-33281

The remote keyfob system on Nissan Sylphy Classic 2021 sends the same RF signal for each door-open request, which allows for a replay attack. NOTE: the vendor's position is that this cannot be reproduced with genuine Nissan parts: for example, the combination of keyfob and door handle shown in the exploit demonstration does not match any technology that Nissan provides to customers.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:nissan:sylphy_classic_2021_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nissan:sylphy_classic_2021:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:05

Type Values Removed Values Added
References () https://chaos-lab.blogspot.com/2023/05/nissan-sylphy-classic-2021-fixed-code.html - Exploit, Third Party Advisory () https://chaos-lab.blogspot.com/2023/05/nissan-sylphy-classic-2021-fixed-code.html - Exploit, Third Party Advisory
References () https://twitter.com/Kevin2600/status/1658059570806415365 - Exploit, Third Party Advisory () https://twitter.com/Kevin2600/status/1658059570806415365 - Exploit, Third Party Advisory
References () https://www.youtube.com/watch?v=GG1utSdYG1k - Exploit, Third Party Advisory () https://www.youtube.com/watch?v=GG1utSdYG1k - Exploit, Third Party Advisory

Information

Published : 2023-05-22 02:15

Updated : 2024-11-21 08:05


NVD link : CVE-2023-33281

Mitre link : CVE-2023-33281

CVE.ORG link : CVE-2023-33281


JSON object : View

Products Affected

nissan

  • sylphy_classic_2021_firmware
  • sylphy_classic_2021
CWE
CWE-294

Authentication Bypass by Capture-replay