Home

Description

The Infotainment ECU manufactured by Bosch uses a RH850 module for CAN communication. RH850 is connected to infotainment over the INC interface through a custom protocol. There is a vulnerability during processing requests of this protocol on the V850 side which allows an attacker with code execution on the infotainment main SoC to perform code execution on the RH850 module and subsequently send arbitrary CAN messages over the connected CAN bus. First identified on Nissan Leaf ZE1 manufactured in 2020.

PUBLISHED Reserved 2025-04-03 | Published 2026-02-15 | Updated 2026-02-17 | Assigner ASRG




CRITICAL: 9.3CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

Default status
unaffected

283C30861E
affected

Credits

Radu Motspan (PCAutomotive Security Assessment Team) finder

References

www.nissan.co.uk/vehicles/new-vehicles/leaf.html product

i.blackhat.com/...mov-Remote-Exploitation-of-Nissan-Leaf.pdf media-coverage

pcacybersecurity.com/...n-infotainment-manufactured-by-bosch third-party-advisory

cve.org (CVE-2025-32058)

nvd.nist.gov (CVE-2025-32058)

Download JSON