Adversaries may may attempt to enumerate services support by Unified Diagnostic Services (UDS). This technique allows adversaries to scan for and identify the various services and functionalities available within the vehicle's onboard systems. By understanding the specific services and identifiers used in the UDS protocol, adversaries can effectively target and exploit vulnerabilities within the vehicle's network.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.