Internet (attacker)
│ Sprint cellular network
▼
Uconnect Head Unit (WinCE, port 6667 open on cellular interface)
│ D-Bus service reflash via open network port
▼
D-Bus service compromise → arbitrary code execution on head unit
│ Internal vehicle Ethernet / CAN gateway
▼
Chassis CAN bus injection:
• 0x3B4 — Steering torque command
• 0x2B0 — Brake pressure command
Result: Remote arbitrary CAN injection from internet, no physical access| Attack Step | Technical Detail | Root Cause |
|---|---|---|
| Entry: Sprint cellular | Port 6667 (IRC-like) open on cellular interface | No firewall between cellular modem and head unit OS |
| Code execution | D-Bus service had no input validation; buffer overflow achievable | No ASLR/NX on WinCE platform; no code signing |
| CAN injection | Head unit had direct CAN bus access without gateway isolation | No CAN firewall; head unit treated as trusted node |
| Fix | OTA patch closed port 6667; added network isolation between head unit and CAN | Took 10 minutes to deploy OTA — demonstrated VSOC value |