Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Where MENA CIOs draw the line on AI sovereignty

    1Password plans are getting more expensive soon

    Discord delays age verification to address user concerns

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026
    • Business

      Where MENA CIOs draw the line on AI sovereignty

      February 24, 2026

      Ex-President’s shift away from Xbox consoles to cloud gaming reportedly caused friction

      February 24, 2026

      Gartner: Why neoclouds are the future of GPU-as-a-Service

      February 21, 2026

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026
    • Crypto

      BitMine Buys $93 Million in ETH, but Ethereum Slides as Holders Resume Selling

      February 24, 2026

      XRP Ledger Sets Multiple Key Records in February Despite Price Decline

      February 24, 2026

      Bhutan Rolls Out Solana-Backed Visas Even As Demand Stays Weak

      February 24, 2026

      ZachXBT Teases Major Crypto Exposé Ahead of Feb. 26 — How Is Smart Money Positioned?

      February 24, 2026

      Acurast turns 225,000 smartphones into a secure AI network on Base

      February 24, 2026
    • Technology

      1Password plans are getting more expensive soon

      February 24, 2026

      Discord delays age verification to address user concerns

      February 24, 2026

      The Pentagon has reportedly given Anthropic until Friday to let it use Claude as it sees fit

      February 24, 2026

      Google sent an AI-generated push alert that included a racial slur

      February 24, 2026

      Here’s the first teaser for A24’s adaptation of The Backrooms

      February 24, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars
    Technology

    PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

    TechAiVerseBy TechAiVerseJuly 12, 2025No Comments6 Mins Read1 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

    Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda.

    OpenSynergy confirmed the flaws last year in June and released patches to customers in September 2024 but many automakers have yet to push the corrective firmware updates. At least one major OEM learned only recently about the security risks.

    The security issues can be chained together into an exploit that researchers call a PerfektBlue attack and can be delivered over-the-air by an attacker, requiring “at most 1-click from a user.”

    Although OpenSynergy’s BlueSDK is widely used in the automotive industry, vendors from other sectors also use it.

    PerfektBlue attacks

    The pentesters team at PCA Cyber Security, a company specialized in automotive security, discovered the PerfektBlue vulnerabilities and reported them to OpenSynergy in May 2024. They are regular participants at Pwn2Own Automotive competitions and have uncovered over 50 vulnerabilities in car systems since last year.

    According to them, the PerfektBlue attack affects “millions of devices in automotive and other industries.”

    Finding the flaws in BlueSDK was possible by analyzing a compiled binary of the software product, since the did not have access to the source code.

    The glitches, listed below, range in severity from low to high and can provide access to the car’s internals through the infotainment system.

    • CVE-2024-45434 (high severity) – use-after-aree in the AVRCP service for Bluetooth profile that allows remote control over media devices
    • CVE-2024-45431 (low severity) – improper validation of an L2CAP ((Logical Link Control and Adaptation Protocol)) channel’s remote channel identifier (CID)
    • CVE-2024-45433 (medium severity) – incorrect function termination in the Radio Frequency Communication (RFCOMM) protocol
    • CVE-2024-45432 (medium severity) – function call with incorrect parameter in the RFCOMM protocol

    The researchers did not share complete technical details about exploiting the PerfektBlue vulnerabilities but said that an attacker paired to the affected device could exploit them to “manipulate the system, escalate privileges and perform lateral movement to other components of the target product.”

    PCA Cyber Security demonstrated PerfektBlue attacks on infotainment head units in Volkswagen ID.4 (ICAS3 system), Mercedes-Benz (NTG6), and Skoda Superb (MIB3), and obtained a reverse shell on top of the TCP/IP that allows communication between devices on a network, such as components in a car.

    The researchers say that with remote code execution on in-vehicle infotainment (IVI) a hacker could track GPS coordinates, eavesdrop on conversations in the car, access phone contacts, and potentially move laterally to more critical subsystems in the vehicle.

    Getting a reverse shell on a Mercedes-Benz NTG6 system
    Source: PCA Cyber Security

    Risk and exposure

    OpenSynergy’s BlueSDK is widely used in the automotive industry but it is difficult to determine what vendors rely on it due to customization and repackaging processes, as well as lack of transparency regarding the embedded software components of a car.

    PerfektBlue is mainly a 1-click RCE because most of the times it requires tricking the user to allow pairing with an attacker device. However, some automakers configure infotainment systems to pair without any confirmation.

    PCA Cyber Security told BleepingComputer that they informed Volkswagen, Mercedes-Benz, and Skoda about the vulnerabilities and gave them sufficient time to apply the patches but the researchers received no reply from the vendors about addressing the issues.

    BleepingComputer has contacted the three automakers asking if they pushed OpenSynergy’s fixes. A statement from Mercedes was not immediately avaialable and Volkswagen said that they started investigating the impact and ways to address the risks immediatelly after learning about the issues.

    “The investigations revealed that it is possible under certain conditions to connect to the vehicle’s infotainment system via Bluetooth without authorization,” a Volkwagen spokesperson told us.

    The German car maker said that leveraging the vulnerabilities is possible only if several conditions are met at the same time:

    • The attacker is within a maximum distance of 5 to 7 meters from the vehicle.
    • The vehicle’s ignition must be switched on.
    • The infotainment system must be in pairing mode, i.e., the vehicle user must be actively pairing a Bluetooth device.
    • The vehicle user must actively approve the external Bluetooth access of the attacker on the screen.

    Even if these conditions occur and an attacker connects to the Bluetooth interface, “they must remain within a maximum distance of 5 to 7 meters from the vehicle” to maintain access, the Volkswagen representative said.

    The vendor underlined that in the case of a successful exploit, a hacker could not interfere with critical vehicle functions like steering, driver assistance, engine, or brakes because they are “on a different control unit protected against external interference by its own security functions.”

    PCA Cyber Security told BleepingComputer that last month they confirmed PerfektBlue at a fourth OEM in the automotive industry, who said that OpenSynergy hadn’t informed them of the issues.

    “We decided not to disclose this OEM because there was not enough time for them to react,” the researchers told us.

    “We plan to disclose the details about this affected OEM as well as the full technical details of PerfektBlue in November 2025, in the format of a conference talk.”

    BleepingComputer has also contacted OpenSynergy to inquire about the impact PerfektBlue has on its customers and how many are affected but we have not received a reply at publishing time.

    Update 7/11 – Open Synergy has responded to BleepingComputer saying that due to NDAs, it cannot disclose which manufacturers or car models are impacted by this flaw, but assured us it is working with them towards a tailored resolution.

    Mercedes-Benz responded to our request for a comment with the following statement:

    “In November 2024, a team of external security researchers contacted us regarding the Open Synergy BlueSDK Bluetooth framework. Our company has thoroughly reviewed the reported findings and all necessary risk mitigation measures were taken. Open Synergy has already provided the update of the BlueSDK library, which is also available via over-the-air updates.” – Mercedes-Benz

    8 Common Threats in 2025

    While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques.

    Drawing from Wiz’s detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleTimekettle T1 Handheld Translator Review: Global Offline Translation
    Next Article WordPress Gravity Forms developer hacked to push backdoored plugins
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    1Password plans are getting more expensive soon

    February 24, 2026

    Discord delays age verification to address user concerns

    February 24, 2026

    The Pentagon has reportedly given Anthropic until Friday to let it use Claude as it sees fit

    February 24, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025691 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025279 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025160 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025122 Views
    Don't Miss
    Business Technology February 24, 2026

    Where MENA CIOs draw the line on AI sovereignty

    Where MENA CIOs draw the line on AI sovereignty By Mastufa Ahmed Published: 24 Feb…

    1Password plans are getting more expensive soon

    Discord delays age verification to address user concerns

    The Pentagon has reportedly given Anthropic until Friday to let it use Claude as it sees fit

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Where MENA CIOs draw the line on AI sovereignty

    February 24, 20260 Views

    1Password plans are getting more expensive soon

    February 24, 20260 Views

    Discord delays age verification to address user concerns

    February 24, 20260 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.