Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The human harbor: Navigating identity and meaning in the AI age

    Stop vetting engineers like it’s 2021 — the AI-native workforce has arrived

    Show HN: Refine – A Local Alternative to Grammarly

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI chatbot Grok issues apology for antisemitic posts

      July 13, 2025

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025
    • Business

      Cloudflare open-sources Orange Meets with End-to-End encryption

      June 29, 2025

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025
    • Crypto

      3 LetsBONK.fun Ecosystem Tokens To Watch For the Third Week of July

      July 14, 2025

      Bank of England Chief Sounds Alarm on Big Bank Stablecoin Issuance

      July 14, 2025

      XRP Rally Is Being Driven By South Korean Traders

      July 14, 2025

      Analyst Says MicroStrategy Could Trigger a Bitcoin Cascade Worse Than Mt. Gox or 3AC

      July 14, 2025

      Pudgy Penguins (PENGU) Skyrockets as Justin Sun Joins the Huddle

      July 14, 2025
    • Technology

      The human harbor: Navigating identity and meaning in the AI age

      July 14, 2025

      Stop vetting engineers like it’s 2021 — the AI-native workforce has arrived

      July 14, 2025

      Show HN: Refine – A Local Alternative to Grammarly

      July 14, 2025

      Myanmar’s proliferating scam centers

      July 14, 2025

      Stellantis declares bankruptcy in China, with $1B in debts

      July 14, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars
    Technology

    PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

    TechAiVerseBy TechAiVerseJuly 12, 2025No Comments6 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

    Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda.

    OpenSynergy confirmed the flaws last year in June and released patches to customers in September 2024 but many automakers have yet to push the corrective firmware updates. At least one major OEM learned only recently about the security risks.

    The security issues can be chained together into an exploit that researchers call a PerfektBlue attack and can be delivered over-the-air by an attacker, requiring “at most 1-click from a user.”

    Although OpenSynergy’s BlueSDK is widely used in the automotive industry, vendors from other sectors also use it.

    PerfektBlue attacks

    The pentesters team at PCA Cyber Security, a company specialized in automotive security, discovered the PerfektBlue vulnerabilities and reported them to OpenSynergy in May 2024. They are regular participants at Pwn2Own Automotive competitions and have uncovered over 50 vulnerabilities in car systems since last year.

    According to them, the PerfektBlue attack affects “millions of devices in automotive and other industries.”

    Finding the flaws in BlueSDK was possible by analyzing a compiled binary of the software product, since the did not have access to the source code.

    The glitches, listed below, range in severity from low to high and can provide access to the car’s internals through the infotainment system.

    • CVE-2024-45434 (high severity) – use-after-aree in the AVRCP service for Bluetooth profile that allows remote control over media devices
    • CVE-2024-45431 (low severity) – improper validation of an L2CAP ((Logical Link Control and Adaptation Protocol)) channel’s remote channel identifier (CID)
    • CVE-2024-45433 (medium severity) – incorrect function termination in the Radio Frequency Communication (RFCOMM) protocol
    • CVE-2024-45432 (medium severity) – function call with incorrect parameter in the RFCOMM protocol

    The researchers did not share complete technical details about exploiting the PerfektBlue vulnerabilities but said that an attacker paired to the affected device could exploit them to “manipulate the system, escalate privileges and perform lateral movement to other components of the target product.”

    PCA Cyber Security demonstrated PerfektBlue attacks on infotainment head units in Volkswagen ID.4 (ICAS3 system), Mercedes-Benz (NTG6), and Skoda Superb (MIB3), and obtained a reverse shell on top of the TCP/IP that allows communication between devices on a network, such as components in a car.

    The researchers say that with remote code execution on in-vehicle infotainment (IVI) a hacker could track GPS coordinates, eavesdrop on conversations in the car, access phone contacts, and potentially move laterally to more critical subsystems in the vehicle.

    Getting a reverse shell on a Mercedes-Benz NTG6 system
    Source: PCA Cyber Security

    Risk and exposure

    OpenSynergy’s BlueSDK is widely used in the automotive industry but it is difficult to determine what vendors rely on it due to customization and repackaging processes, as well as lack of transparency regarding the embedded software components of a car.

    PerfektBlue is mainly a 1-click RCE because most of the times it requires tricking the user to allow pairing with an attacker device. However, some automakers configure infotainment systems to pair without any confirmation.

    PCA Cyber Security told BleepingComputer that they informed Volkswagen, Mercedes-Benz, and Skoda about the vulnerabilities and gave them sufficient time to apply the patches but the researchers received no reply from the vendors about addressing the issues.

    BleepingComputer has contacted the three automakers asking if they pushed OpenSynergy’s fixes. A statement from Mercedes was not immediately avaialable and Volkswagen said that they started investigating the impact and ways to address the risks immediatelly after learning about the issues.

    “The investigations revealed that it is possible under certain conditions to connect to the vehicle’s infotainment system via Bluetooth without authorization,” a Volkwagen spokesperson told us.

    The German car maker said that leveraging the vulnerabilities is possible only if several conditions are met at the same time:

    • The attacker is within a maximum distance of 5 to 7 meters from the vehicle.
    • The vehicle’s ignition must be switched on.
    • The infotainment system must be in pairing mode, i.e., the vehicle user must be actively pairing a Bluetooth device.
    • The vehicle user must actively approve the external Bluetooth access of the attacker on the screen.

    Even if these conditions occur and an attacker connects to the Bluetooth interface, “they must remain within a maximum distance of 5 to 7 meters from the vehicle” to maintain access, the Volkswagen representative said.

    The vendor underlined that in the case of a successful exploit, a hacker could not interfere with critical vehicle functions like steering, driver assistance, engine, or brakes because they are “on a different control unit protected against external interference by its own security functions.”

    PCA Cyber Security told BleepingComputer that last month they confirmed PerfektBlue at a fourth OEM in the automotive industry, who said that OpenSynergy hadn’t informed them of the issues.

    “We decided not to disclose this OEM because there was not enough time for them to react,” the researchers told us.

    “We plan to disclose the details about this affected OEM as well as the full technical details of PerfektBlue in November 2025, in the format of a conference talk.”

    BleepingComputer has also contacted OpenSynergy to inquire about the impact PerfektBlue has on its customers and how many are affected but we have not received a reply at publishing time.

    Update 7/11 – Open Synergy has responded to BleepingComputer saying that due to NDAs, it cannot disclose which manufacturers or car models are impacted by this flaw, but assured us it is working with them towards a tailored resolution.

    Mercedes-Benz responded to our request for a comment with the following statement:

    “In November 2024, a team of external security researchers contacted us regarding the Open Synergy BlueSDK Bluetooth framework. Our company has thoroughly reviewed the reported findings and all necessary risk mitigation measures were taken. Open Synergy has already provided the update of the BlueSDK library, which is also available via over-the-air updates.” – Mercedes-Benz

    8 Common Threats in 2025

    While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques.

    Drawing from Wiz’s detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleTimekettle T1 Handheld Translator Review: Global Offline Translation
    Next Article WordPress Gravity Forms developer hacked to push backdoored plugins
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    The human harbor: Navigating identity and meaning in the AI age

    July 14, 2025

    Stop vetting engineers like it’s 2021 — the AI-native workforce has arrived

    July 14, 2025

    Show HN: Refine – A Local Alternative to Grammarly

    July 14, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202528 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202520 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202519 Views
    Don't Miss
    Technology July 14, 2025

    The human harbor: Navigating identity and meaning in the AI age

    The human harbor: Navigating identity and meaning in the AI age July 13, 2025 1:35…

    Stop vetting engineers like it’s 2021 — the AI-native workforce has arrived

    Show HN: Refine – A Local Alternative to Grammarly

    Myanmar’s proliferating scam centers

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The human harbor: Navigating identity and meaning in the AI age

    July 14, 20252 Views

    Stop vetting engineers like it’s 2021 — the AI-native workforce has arrived

    July 14, 20252 Views

    Show HN: Refine – A Local Alternative to Grammarly

    July 14, 20252 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.