ZF Roll Stability Support Plus (RSSPlus)
ZF RSSPlus 2M contains an authentication bypass vulnerability in its J2497 powerline communication protocol implementation. An unauthenticated attacker with RF equipment in proximity can call diagnostic functions on the trailer control module, potentially disrupting roll stability monitoring or altering system integrity. The affected builds are RSSPlus 2M versions built between January 8 and January 23. No firmware patch is planned; ZF recommends disabling J2497 features (except LAMP ON detection) and migrating to newer trailer bus technology with proper authentication.
- RF transmission equipment capable of broadcasting on J2497 powerline communication frequency
- Physical proximity to the vehicle (proximal/adjacent RF range)
- No authentication required to trigger diagnostic functions
- Target vehicle must be running the affected RSSPlus build dates
Patching may require device reboot — plan for process interruption
/api/v1/advisories/46ce948f-b8bd-48ba-bd13-d9c9c121a187Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.