Infotainment Security
IVI
In-Vehicle Infotainment (IVI) systems run full operating systems (Android, QNX, Linux) and provide numerous attack surfaces including Bluetooth, WiFi, and USB.
Attack Surfaces
Wireless
- • Bluetooth pairing attacks
- • WiFi AP exploitation
- • Cellular modem
- • NFC (if present)
Physical
- • USB ports (malicious devices)
- • SD card (firmware updates)
- • Debug ports (UART, JTAG)
- • App installation
Bluetooth Attacks
bash
# Bluetooth scanning
hcitool scan
bluetoothctl
> scan on
# Check for BlueZ vulnerabilities
# BlueBorne, KNOB attack, etc.
# Bluetooth audio injection
# Some systems accept audio from unauthenticated sources
# Exploit Android-based IVI
# Standard Android vulns may apply
# Check for debug builds, unlocked bootloaders
# USB attacks
# Malicious USB devices
# USBKill
# BadUSB for HID injection
# Firmware extraction
# Monitor for update files
# Analyze SD card update mechanismCAN Gateway
IVI systems often connect to the CAN bus through a gateway. Compromising the IVI
may allow pivoting to vehicle control systems.