Listen to this Post
As automotive technology becomes increasingly connected, the risk of cyber vulnerabilities in vehicles grows. A recent study has exposed significant flaws in the security of some popular vehicles, opening new doors for cybersecurity research in the automotive sector. These vulnerabilities, if exploited, could allow remote control over vehicles, posing a severe threat to road safety and consumer privacy. In this article, we delve into the findings of two researchers, Yingjie Cao and Xinfeng Chen, who have revealed these dangerous flaws and explored how they can be tested with minimal cost.
Vulnerabilities Exposed in China-Based Automotive Manufacturer
A well-known Chinese automaker has come under scrutiny after researchers discovered serious security vulnerabilities within its products. These flaws are present in over 150,000 vehicles sold in 2024, raising alarms for owners of these cars across China. While the name of the manufacturer remains undisclosed due to regulatory reasons, the findings shed light on significant gaps in vehicle cybersecurity.
Yingjie Cao, one of the lead researchers, explained that the vulnerabilities they found could allow cyber attackers to perform man-in-the-middle (MiTM) attacks, ultimately gaining remote control of the vehicle. Cao, alongside his research partner Xinfeng Chen, is scheduled to present their findings at Black Hat Asia in 2025.
The Two Major Vulnerabilities
Cao and
- In-Vehicle Infotainment (IVI) Vulnerability: The first bug they discovered was within the IVI system, commonly known as the head unit. Exploiting this flaw could lead to low-level code execution, with the potential to escalate privileges using a kernel exploit. This could give attackers limited control over vehicle functions, such as opening doors, the trunk, windows, and headlights.
App-Related Vulnerability: The second vulnerability lies within the vehicle’s mobile application, which lacks a trusted certificate. By injecting a fake certificate into the app, Cao and Chen were able to hijack traffic and gain control of the vehicle remotely. This vulnerability allows an attacker to manipulate the carās features through a simple MiTM attack, without needing direct access to the vehicle.
Both vulnerabilities are considered ābeginner-levelā by the researchers, implying that individuals with basic cybersecurity knowledge could carry out these attacks with relative ease.
The Growing Risk of Automotive Cybersecurity
As cars become more connected through software-defined features, the potential for cybersecurity risks continues to grow. The increasing complexity of automotive systems means that more code is running within the vehicle, leaving greater room for vulnerabilities to be exploited. Unfortunately, many automotive companies are still behind the curve when it comes to cybersecurity.
A recent study by Synopsys and SAE International revealed that many automotive companies only have a handful of cybersecurity experts dedicated to product security, and nearly one-third of organizations don’t have a dedicated security team at all. Even those with cybersecurity programs often test less than half of their vehicleās hardware and software components for security flaws.
This lack of robust security measures is exacerbated by the fact that more and more cars rely on software for crucial features, making them more susceptible to remote attacks. Researchers have already uncovered similar vulnerabilities in systems like Mazda’s IVI, with some bugs capable of compromising the carās full software system or even gaining access to the Controller Area Network (CAN) bus, which controls the physical functions of the car.
Testing Without Breaking the Bank
One of the most groundbreaking aspects of Cao and Chen’s research is that they didn’t need to purchase expensive hardware or access proprietary software to uncover these flaws. Instead, they performed their testing remotely, a method that could significantly reduce the costs of cybersecurity research in the automotive industry. This innovative approach could pave the way for future research on vehicle cybersecurity, especially for independent researchers who lack access to expensive car components.
Cao and Chenās findings highlight the need for the automotive industry to step up its cybersecurity efforts, particularly as connected vehicles become the norm. Their research not only exposes critical vulnerabilities but also challenges the industry to adopt more affordable and effective testing methods.
What Undercode Says:
The rapid digitization of automobiles is creating new avenues for cybersecurity breaches, as highlighted by the vulnerabilities discovered in the Chinese carmakerās products. This discovery serves as a stark reminder of the importance of securing automotive software against increasingly sophisticated threats. The fact that the flaws were relatively easy to exploit raises concerns about the overall state of automotive cybersecurity.
As we move toward a more connected world, where vehicles are an integral part of the Internet of Things (IoT), it becomes imperative for car manufacturers to invest in robust cybersecurity frameworks. The research by Cao and Chen also emphasizes the pressing need for proactive measures, rather than reactive responses to security breaches.
However, the critical takeaway from this study is the accessibility of such vulnerabilities. The fact that the researchers managed to conduct their tests remotely without the need for proprietary hardware suggests that cybersecurity testing could be democratized, opening doors for independent researchers to contribute to the field without needing expensive resources. This could be a game-changer for the automotive cybersecurity industry, especially as the technology continues to evolve.
While the vulnerabilities highlighted in the study were ābeginner-level,ā they serve as a warning to the automotive sector that it must significantly improve its cybersecurity practices. The ability to control a vehicle remotely is a serious security risk, and manufacturers need to ensure that software-defined features are adequately protected against such attacks.
Moreover, the findings underscore the broader challenge in the tech industry: the need for better-trained cybersecurity teams within organizations. Given the increasing complexity of car software, automotive companies must address the shortage of cybersecurity professionals to avoid future breaches.
The risks associated with these vulnerabilities extend beyond just individual safety. As more cars become interconnected, they could serve as entry points into larger networks, potentially jeopardizing the security of entire cities and infrastructure. Therefore, itās critical for both manufacturers and cybersecurity researchers to stay ahead of emerging threats.
Fact Checker Results
- Vulnerability Severity: The vulnerabilities uncovered in the study are significant but would require basic knowledge of cybersecurity to exploit.
- Vehicle Impact: While the flaws are serious, they do not suggest that the vehicles are at imminent risk if proper updates and patches are implemented.
– Research Methodology: Cao and
References:
Reported By: https://www.darkreading.com/cybersecurity-operations/mitm-vulns-research-opportunities-car-security
Extra Source Hub:
https://www.medium.com
Wikipedia
Undercode AI
Image Source:
Pexels
Undercode AI DI v2