Impact
Vanetza V2X v26.02 contains a defect in the GeoNetworking packet parser where OpenSSL exceptions thrown during ECC point validation are not fully caught. The exception propagates through the Router::indicate() call chain, ultimately causing std::terminate and crashing the receiver process. Attackers can exploit this remotely, sending crafted packets to trigger the exception and bring the V2X service down, disrupting critical vehicle‑to‑vehicle communications.
Affected Systems
The vulnerability affects installations of Vanetza V2X version 26.02. Any system running this specific release is susceptible; newer releases after 26.02 are not mentioned.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity impact. Although an EPSS score is not provided, the lack of a KEV listing suggests no currently documented exploits. The attack vector is inferred to be remote, as the payload is delivered over the network to the IPv6 GeoNetworking stack.
OpenCVE Enrichment