Aggregator
CVE-2024-46757 | Linux Kernel up to 6.10.9 hwmon integer underflow (Nessus ID 208099)
CVE-2024-46758 | Linux Kernel up to 6.10.9 hwmon DIV_ROUND_CLOSEST integer underflow (Nessus ID 208099)
Google Chrome AI extensions deliver info-stealing malware in broad attack
Looking at the Attack Surfaces of the Sony XAV-AX8500
Looking at the Attack Surfaces of the Sony XAV-AX8500
For the upcoming Pwn2Own Automotive contest a total of 4 head units have been selected. One of these is the single DIN Sony XAV-AX8500 that offers a variety of functionality such as wired and wireless Android Auto and Apple CarPlay as well as USB media playback and more.
This blog post presents internal photos of the XAV-AX8500 boards and highlights each of the interesting components.
Internals
Accessing the internals of the XAV-AX8500 involves removing a few screws and metal plates. Once the main chassis is open 3 interconnected boards are exposed that are connected via flat flexible cables. The main board is shown below.
Figure 1: Main board (top)
The main application processor is an NXP i.MX 8M Mini with part number MIMX8MM6CVTKZAA. This is a powerful processor with 4 Cortex-A53 cores as well as a low power Cortex M4 that is used for lighter workloads and also security related functions.
To the left of the processor is the supporting SDRAM and eMMC the i.MX 8M Mini utilizes. The SDRAM is an 8Gb Nanya NT6AN256T32AV-J2 8Gb LPDDR4 chip and below that is a 16GB Samsung KLMAG1JETD eMMC chip.
To the right of the eMMC is the Rohm BD71847A PMIC and further right is an unused socket. There's also HDMI and USB-C inputs towards the bottom right of the board.
Above the unused socket is the Murata LBEE5ZZ1PJ radio module that handles Wi-Fi and Bluetooth operations.
The underside of the main board is shown below.
Figure 2: Main board (underside)
There isn't much to see other than the Analog Devices ADV7482 video decoder and HDMI receiver chip.
Next to the main board is a smaller board that receives GPS, iData Link and optional remote control input.
Figure 3: GPS, iData Link and remote control board (top)
The GPS module is the Unicorecomm UM220-INS NL which is advertised as a "High-end GNSS+MEMS Integrated Navigation and Positioning Module".
Under both of these boards sits a much larger PCB that handles power and various other inputs and outputs such as audio and video. A photo of this board is shown below.
Figure 4: Power, audio and video board (top)
Towards the bottom left is the LC88FC2H0A microcontroller from ON Semiconductor. This uses the obscure 16-bit Xstormy16 architecture and is suggested for use in white goods, home audio and car audio applications. To the left of the microcontroller is an unused 5 pin socket.
The other components are related to power handling and digital signal processing.
For completeness the underside of the board is shown below.
Figure 5: Power, audio and video board (underside)
There isn't much of interest on this side.
Summary
Hopefully, this blog post provides enough information to kickstart vulnerability research against the XAV-AX8500. Keep an eye out for future posts that will cover the threat landscape of the XAV-AX8500.
We are looking forward to Automotive Pwn2Own again in Tokyo in January 2025 at Automotive World, and we will see if IVI vendors have improved their product security. Don’t wait until the last minute to ask questions and register! We hope to see you there.
You can find me on Twitter at @ByteInsight, and follow the team on Twitter, Mastodon, LinkedIn, or Bluesky for the latest in exploit techniques and security patches.
Japan Faces Prolonged Cyber-Attacks Linked to China’s MirrorFace
Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace
Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. This cutting-edge tool provides real-time phishing email detection and URL blocking for Microsoft Outlook, adding an essential layer of email security in the face of increasing cyber threats. Advances in generative […]
The post Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-22542 | Ofek Nakar Virtual Bot Plugin up to 1.0.0 on WordPress sql injection
CVE-2025-22510 | Konrad Karpieszuk WC Price History for Omnibus Plugin up to 2.1.4 on WordPress deserialization
CVE-2025-22504 | jumpdemand 4ECPS Web Forms Plugin up to 0.2.18 on WordPress unrestricted upload
CVE-2025-22561 | Jason Funk Title Experiments Free Plugin up to 9.0.4 on WordPress authorization
CVE-2025-22535 | Jonathan Kern WPListCal Plugin up to 1.3.5 on WordPress sql injection
CVE-2025-22540 | Sebastian Orellana Emailing Subscription Plugin up to 1.4.1 on WordPress sql injection
CVE-2025-22527 | Yamna Khawaja Mailing Group Listserv Plugin up to 2.0.9 on WordPress sql injection
CVE-2025-22505 | Nabaraj Chapagain NC Wishlist for Woocommerce Plugin up to 1.0.1 on WordPress sql injection
CVE-2025-22537 | traveller11 Google Maps Travel Route Plugin up to 1.3.1 on WordPress sql injection
CVE-2025-22508 | Roninwp FAT Event Lite Plugin up to 1.1 on WordPress filename control
Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency
Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency
While AI/ML and automation promise to help streamline and reduce security operation costs, these efforts could be significantly boosted by the increased availability of standard interfaces
The post Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency appeared first on Security Boulevard.