CVE-2022-25922

ICSA-22-063-01 Missing Authentication for Critical Function in Trailer Power Line Communications (PLC) J2497

Description

Power Line Communications PLC4TRUCKS J2497 trailer brake controllers implement diagnostic functions which can be invoked by replaying J2497 messages. There is no authentication or authorization for these functions.

Remediation

Workaround:

  • The vulnerable technology, J2497, has been fielded since 2001 and the service lifetime of trailers is 15 to 30 years. For new equipment, the industry should consider dropping all J2497 features except for backwards-compatibility with LAMP ON detection only. For trailer equipment this means migrating all diagnostics to whatever newer trailer buses are established as the norm. For tractor equipment this means removing support for reception of any J2497 message other than LAMP messages and protecting the backwards-compatible trailers from attack. NMFTA has published detailed information about how to mitigate these issues in the following ways: Install a LAMP ON firewall for each ECU Use a LAMP detect circuit LAMP ON sender with each trailer Change addresses dynamically on each tractor in response to detecting a transmitter on its current address. Install RF chokes on each trailer between chassis ground and wiring ground Load with LAMP keyhole signal on each tractor Flood with jamming signal on each tractor Please see the publication from the NMFTA for additional details on these and other solutions.

Category

6.1
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.20%
Third-Party Advisory cisa.gov
Affected: Power Line Communications PLC4TRUCKS
Published at:
Updated at:

References

Link Tags
https://www.cisa.gov/uscert/ics/advisories/icsa-22-063-01 third party advisory us government resource

Frequently Asked Questions

What is the severity of CVE-2022-25922?
CVE-2022-25922 has been scored as a medium severity vulnerability.
How to fix CVE-2022-25922?
As a workaround for remediating CVE-2022-25922: The vulnerable technology, J2497, has been fielded since 2001 and the service lifetime of trailers is 15 to 30 years. For new equipment, the industry should consider dropping all J2497 features except for backwards-compatibility with LAMP ON detection only. For trailer equipment this means migrating all diagnostics to whatever newer trailer buses are established as the norm. For tractor equipment this means removing support for reception of any J2497 message other than LAMP messages and protecting the backwards-compatible trailers from attack. NMFTA has published detailed information about how to mitigate these issues in the following ways: Install a LAMP ON firewall for each ECU Use a LAMP detect circuit LAMP ON sender with each trailer Change addresses dynamically on each tractor in response to detecting a transmitter on its current address. Install RF chokes on each trailer between chassis ground and wiring ground Load with LAMP keyhole signal on each tractor Flood with jamming signal on each tractor Please see the publication from the NMFTA for additional details on these and other solutions.
Is CVE-2022-25922 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-25922 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-25922?
CVE-2022-25922 affects Power Line Communications PLC4TRUCKS.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.