Vulnerability Description
The Infotainment ECU manufactured by Bosch which is installed in Nissan Leaf ZE1 – 2020 uses a Redbend service for over-the-air provisioning and updates. HTTPS is used for communication with the back-end server. Due to usage of the default configuration for the underlying SSL engine, the server root certificate is not verified. As a result, an attacker may be able to impersonate a Redbend backend server using a self-signed certificate. First identified on Nissan Leaf ZE1 manufactured in 2020.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- http://i.blackhat.com/Asia-25/Asia-25-Evdokimov-Remote-Exploitation-of-Nissan-Le
- https://pcacybersecurity.com/resources/advisory/vulnerabilities-in-nissan-infota
- https://www.nissan.co.uk/vehicles/new-vehicles/leaf.html
FAQ
What is CVE-2025-32057?
CVE-2025-32057 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Infotainment ECU manufactured by Bosch which is installed in Nissan Leaf ZE1 – 2020 uses a Redbend service for over-the-air provisioning and updates. HTTPS is used for communication with the back-...
How severe is CVE-2025-32057?
CVE-2025-32057 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-32057?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.