Automotive cybersecurity

jeep cherokee kl 3200cc registered july 2014Charles01 / Wikipedia
Chrysler Jeep Cherokee

Think this impossible? Last year, Wired wrote about a couple of hackers remotely disabling a Chrysler Jeep Cherokee while it was heading down a freeway at 70 miles per hour. The hackers,  Charlie Miller and Chris Valasek, revealed more details in a subsequent presentation at Black Hat USA 2015 a month later. It turns out that their first point of entry into the Jeep’s control system was via the Wi-Fi service of the vehicle’s multimedia system. Sadly, cracking its security wasn’t that hard:

… they used a 2014 Jeep Cherokee that was equipped with a Harman-Kardon “head unit” that controls the central display and entertainment system. Initially, they hacked this unit through Wi-Fi (the unit provides a Wi-Fi hotspot for passengers to use), but soon were able to tap into it through its cellular connection, which goes over Sprint’s wireless network.

The hackers then connected from the head unit to the car’s CAN bus (the command and control system used in many modern vehicles) via a another device, a V850 processor, which was only configured to only listen to CAN bus traffic. This, however, didn’t stop the hackers because the processor wasn’t configured to be secure, so they were able to reflash its operating system so that the processor could then both send and receive CAN bus messages, thus they:

… had full access to the car’s CAN bus and thus could manipulate almost everything—locks, brakes, transmission, even take control of steering at low speeds. 

The subsequent paper by Miller and Valasek, Remote Exploitation of an Unaltered Passenger Vehicle, goes into to even more detail on how the hack was engineered and they note:

The Harman Uconnect system is not limited to the Jeep Cherokee, and is quite common in the ChryslerFiat line of automobiles and even looks to make an appearance in the Ferrari California! This means that while the cyber physical aspects of this paper are limited to a 2014 Jeep Cherokee, the Uconnect vulnerabilities and information is relevant to any vehicle that includes the system. Therefore the amount of vulnerable vehicles on the road increases dramatically. 

After the Wired article, Fiat Chrysler engineered a patch for the system and Sprint blocked cellular IP access but the Wi-Fi access vulnerability still remained in roughly 1.4 million Fiat Chrysler vehicle. The affected models were:

  • 2013-2015 MY Dodge Viper specialty vehicles
  • 2013-2015 Ram 1500, 2500 and 3500 pickups
  • 2013-2015 Ram 3500, 4500, 5500 Chassis Cabs
  • 2014-2015 Jeep Grand Cherokee and Cherokee SUVs
  • 2014-2015 Dodge Durango SUVs 2015 MY Chrysler 200, Chrysler 300 and Dodge Charger sedans
  • 2015 Dodge Challenger Sports coupes

Despite Fiat Chrysler issuing a recall last year, there are still millions of cars on the road that haven’t been patched and while no immediate threats have identified or exploits seen “in the wild,” the vulnerability should still be a serious concern to car owners. 

Read More: http://www.networkworld.com/article/3091126/security/automotive-cybersecurity-what-we-dont-hack-will-probably-be-used-to-kill-us.html

Feel free to contact us via our cash for cars website if you are interested in getting a quote

The post Automotive cybersecurity appeared first on http://galway.cashforcarsireland.com/

Advertisements