Log4j Vulnerabilities in Connected Cars and Charging Stations
December 23, 2021
In his report, Sébastien Dudek looked into the possibility of attackers using the Log4j vulnerabilities in the automotive world, specifically to gain access to devices used in cars and car chargers.
UN R155 References
- 4.3.1 Threats regarding back-end servers related to vehicles in the field
- 4.3.2 Threats to vehicles regarding their communication channels
- 4.3.3 Threats to vehicles regarding their update procedures
- 4.3.5 Threats to vehicles regarding their external connectivity and connections
- 4.3.6 Threats to vehicle data/code
- 4.3.7 Potential vulnerabilities that could be exploited if not sufficiently protected or hardened