{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T15:18:06.578","vulnerabilities":[{"cve":{"id":"CVE-2024-51073","sourceIdentifier":"cve@mitre.org","published":"2024-11-22T16:15:33.730","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[{"sourceIdentifier":"cve@mitre.org","tags":["disputed"]}],"descriptions":[{"lang":"en","value":"An issue in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to control or disrupt CAN communication between the instrument cluster and CAN bus. NOTE: this is disputed by the Supplier because the findings came from a potentially unrealistic test environment (an isolated ECU part that was not in a vehicle), and because the observed behavior follows the UDS (Unified Diagnostic Services) specification."},{"lang":"es","value":"Un problema en Cluster KIA Seltos Software v1.0, Hardware v1.0 permite a los atacantes interrumpir las comunicaciones entre el grupo de instrumentos y el bus CAN."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.3}]},"references":[{"url":"https://github.com/nitinronge91/KIA-SELTOS-Cluster-Vulnerabilities/blob/3755e3f692dce5b1ab06de2d04a2433c907ab21c/CVE/Control%20CAN%20communication%20for%20KIA%20SELTOS%20Cluster%20CVE-2024-51073.md","source":"cve@mitre.org"},{"url":"https://udsoncan.readthedocs.io/en/latest/udsoncan/services.html","source":"cve@mitre.org"},{"url":"https://www.iso.org/standard/77323.html","source":"cve@mitre.org"}]}}]}