The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).
History

Mon, 05 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zephyr

Published: 2022-10-31T17:45:09.741Z

Updated: 2025-05-05T14:06:07.171Z

Reserved: 2022-08-09T00:00:00.000Z

Link: CVE-2022-2741

cve-icon Vulnrichment

Updated: 2024-08-03T00:46:04.174Z

cve-icon NVD

Status : Modified

Published: 2022-10-31T18:15:13.870

Modified: 2024-11-21T07:01:37.073

Link: CVE-2022-2741

cve-icon Redhat

No data.