documentation/modules/post/android/local/koffee.md
KOFFEE exploits the CVE-2020-8539, which is an Arbitrary Code Execution vulnerability that allows a user to execute the
micomd binary with valid payloads on Kia Motors Head Units. By using KOFFEE an attacker can send crafted micomd
commands to control the head unit and send CAN bus frames into the Multimedia CAN (M-Can) of the vehicle.
msfconsoleuse post/android/local/koffeeset session 1toogle_radio_mute or runIt contains the path to micomd executable
It expresses the number of MICOM commands sent each time
It indicates the time (ms) interval between two MICOM commands, aka Period of CAN frames
It refers to the metasploit session number on which this module is run.
It refers to the Micom payload to be injected, e.g., cmd byte1 byte3 byte2'. By default it is set to 00 00 00. This
options works only for the INJECT_CUSTOM action
The following actions can be triggered on the Head Unit. An action can be triggered by inserting in the Metasploit input
console the action name in lowercase, e.g., camera_reverse_off.
An action can be also triggered using the commands:
set action CAMERA_REVERSE_ONrunTo execute the INJECT_CUSTOM action, you may want also to set up the right payload.
The commands to use to trigger this action are
set action INJECT_CUSTOMset CMD_PAYLOAD 01 FFrunKOFFEE can be run as post-exploitation module when an active session is available with the Head Unit (HU). First, an attacker may create a malicious apk to generate a remote connection with the HU. For instance, using msfvenom or other tools, an attacker can create the malicious apk that, once installed in the HU, starts an active session. Now, the attacker is able to use the KOFFEE exploit to take control of the HU and inject CAN bus frames into the M-CAN bus of the vehicle.
msf > use post/android/local/koffee
msf post(android/local/koffee) > set session 1
session => 1
msf post(android/local/koffee) > toggle_radio_mute
[*] -- Starting action --
[*] -- Mute/umute radio --
[+] -- Command Sent --