Tesla responds to Model S hacking
The senior researchers from Keen Security Lab were able to hijack the car from up to 20km away (12 miles) to activate brakes, unlock doors, and fold mirrors.
The hackers, Sen Nie, Ling Liu, and Wen Lu, along with director Samuel Lv, said they were also able to hijack the Tesla’s control screen.
After contacting Tesla with their findings, the carmaker deployed an over-the-air software update (v7.1, 2.36.31) that addressed the security issues.
Tesla said: “The issue demonstrated is only triggered when the web browser is used, and also required the car to be physically near to and connected to a malicious Wi-Fi hotspot. Our realistic estimate is that the risk to our customers was very low, but this did not stop us from responding quickly.”
It added: “We engaged with the security research community to test the security of our products so that we can fix potential vulnerabilities before they result in issues for our customers. We commend the research team behind today’s demonstration and plan to reward them under our bug bounty program, which was set up to encourage this type of research.”
Brian Spector, CEO of cyber security firm MIRACL, also commented on the hacking, saying: “These hacks demonstrate the serious problems around identity verification in today’s connected cars. Having very limited encryption, identity management and data protection within such a powerful computer is extremely dangerous and poses a real and serious threat to everyone using our roads today. Move forwards to the increasing trend for driverless cars, and the potential fallout from this lack of authentication becomes even more frightening.
“For connected cars to become more secure, relationships must be established within each and every component within a vehicle, to ensure that only a legitimate operator can control the connected devices within a car. Given the huge number of components in connected cars, hackers usually find a pathway by following a ‘weakest link’ scenario which attacks the easiest point of entry to the vehicle. This problem is compounded by the array of parts that comprise a vehicle, and the lack of a security protocol that ensures they will all work together safely and securely.
“The current security checks often fail because they rely on slow, centralised identity verification services. To connect the components more quickly and autonomously, manufacturers should deploy a distributed trust model which allows for fast pre-authorisation, and removes the roadblock of a centralised service.”
Leave a comment