The Recall Risk From Unseen Vulnerabilities: Strategies for Safer Software-Defined Vehicles

May 21, 2025
VicOne
The Recall Risk From Unseen Vulnerabilities: Strategies for Safer Software-Defined Vehicles

By Ling Cheng (Marketing Director)

Did you know that current methods for managing software vulnerabilities still carry the risk of recalls? This is because many vulnerabilities’ details remain undisclosed or are only officially revealed after long delays. This gap makes it impossible to defend systems against attacks that exploit zero-day vulnerabilities.

What are zero-day vulnerabilities?

A zero-day vulnerability is a hidden, high-risk threat that attackers can exploit before it is widely known. If a zero-day attack occurs unexpectedly and no solution is available, companies might face costly recalls and serious reputational damage. For example, an OEM was forced to recall 1.4 million vehicles and incurred a US$105 million fine following an attack.

Dealing with a zero-day vulnerability can be highly challenging, with the threat stemming from three key scenarios:

  • Attackers know about the vulnerability, but no one else does.
  • Attackers know about the vulnerability, and only a small group of insiders or dark web users are aware of it.
  • Attackers know about the vulnerability, but the affected company remains completely unaware.

What does this mean? Since zero-day vulnerabilities are unknown, there are no solutions available. As a result, zero-day attacks have a high success rate, posing a significant risk to companies that could lead to devastating consequences.

Zero-day vulnerabilities are a real and growing threat

At the inaugural edition of VicOne and Trend Zero Day Initiative™ (ZDI)’s Pwn2Own Automotive vulnerability discovery contest, held in 2024, researchers uncovered 49 zero-day vulnerabilities in just three days — more than the total found in all of 2023. Noteworthy discoveries included vulnerabilities that could:

At the 2025 edition of Pwn2Own Automotive, another 49 zero-day vulnerabilities were discovered by researchers over three days.

Yet, these high-risk vulnerabilities are not included in the National Vulnerability Database (NVD). Due to the closed nature of the automotive industry, many vulnerabilities’ details are not reported to the NVD, let alone their details disclosed, leaving security gaps hidden from public awareness. Focusing solely on known vulnerabilities is no longer enough to address the evolving risks in today’s software-defined vehicle (SDV) ecosystem.

Figure 1. The current most commonly used method for handling software security risks

Figure 1. The current most commonly used method for handling software security risks

Integrating zero-day vulnerability intelligence

In contrast to vulnerability management platforms that narrowly address known open-source vulnerabilities only, VicOne’s xZETA offers superior visibility into zero-day, undisclosed, and known vulnerabilities, Common Weakness Enumeration (CWE), advanced persistent threats (APTs),* and ransomware.* Our threat intelligence surpasses the National Vulnerability Database (NVD) by 189%, providing a wider spectrum of detection coverage.

Figure 2. VicOne’s xZETA offers the best coverage with 189% more visibility than the NVD.

Figure 2. VicOne’s xZETA offers the best coverage with 189% more visibility than the NVD.

At VicOne, we fully understand the critical impact that zero-day vulnerabilities can have on the automotive industry. This is why we employ proactive yet comprehensive strategies — including AI-powered zero-day identification research, dark web monitoring, vulnerability acquisition and intelligence sharing, and automotive vulnerability discovery contests — to uncover and address these threats. These efforts reinforce our automotive cybersecurity solutions leadership and unwavering commitment to securing connected vehicles in an ever-evolving threat landscape.



*Patent pending

Our News and Views

Gain Insights Into Automotive Cybersecurity

  • Pwn2Own Automotive 2026 Day 3: New Master of Pwn Announced and Other Highlights
    Blog
    January 26, 2026
    Pwn2Own Automotive 2026 set a new record with 76 unique zero-day vulnerabilities discovered, exposing the rapidly expanding attack surface across SDVs, IVI systems, and EV charging infrastructure. The final day crowned Fuzzware.io as Master of Pwn 2026, with 28 Master of Pwn points.
    Read More
  • Pwn2Own Automotive 2026 Day 2: EV Chargers Hit Full Throttle
    Blog
    January 23, 2026
    Day 2 delivered 29 new zero-days, pushing the total to a record 66. Researchers repeatedly compromised Level 2/3 EV chargers and IVI systems using practical flaws like exposed interfaces and command injection. The takeaway: automotive and charging infrastructure attacks are now repeatable at scale—shifting cyber risk from theoretical to immediate operational impact.
    Read More
  • Pwn2Own Automotive 2026: Uncovering 37 Unique Zero-Days
    Blog
    January 22, 2026
    Pwn2Own Automotive 2026 Day 1 opened with record-breaking momentum, with researchers successfully compromising infotainment systems, EV chargers, and Tesla interfaces—highlighting how expansive today’s automotive attack surface has become. The surge in entries and chained exploits confirms a clear shift: in the SDV era, automotive cyber risk is no longer isolated to the vehicle, but systemic across the entire ecosystem.
    Read More
  • Pwn2Own Automotive 2026: Turning Zero-Day Discovery into Automotive Foresight
    Blog
    January 15, 2026
    Pwn2Own Automotive 2026 exposes critical zero-day vulnerabilities in software-defined vehicles before they escalate into real-world business and operational risk. By ensuring zero-day vulnerabilities move from exposure to resolution, the event transforms discovery into Automotive Foresight—helping organizations stay ahead of risk before it reaches the road.
    Read More
Visit Our Blog

Accelerate Your Automotive Cybersecurity Journey Today

Contact Us