Vulnerabilities / Threats
1/12/2011
10:55 AM
50%
50%

Schwartz On Security: Hack My Ride

Car security exploits are fast, cheap, and out of control. Why don't automotive manufacturers do more to secure their vehicles?

What do car immobilizers, remote tire pressure gauges, and wireless car-key fobs have in common? Beyond the obvious automotive angle, they've all been hacked using relatively low-cost exploits.

Take car immobilizers and keyless entry systems. A group of Swiss researchers from ETH Zurich recently demonstrated an attack -- dubbed the Autoknacker in Swiss German -- against 10 recent car models from eight different manufacturers, all of which use passive keyless entry and start (PKES). Under this system, a key fob only needs to be physically near the car to deactivate the immobilizer, open the doors, and start the engine.

Here's where attackers come in: By using a pair of wireless antennas, they can rebroadcast the key fob's signal in nanoseconds to fool the car into thinking the driver is present. Furthermore, the antenna picking up the key fob's signal needs to be within only 8 meters (26 feet) of it, making the attack difficult to detect.

The Swiss researchers tested two attack scenarios. First, when a driver is in the supermarket, key fob in his pocket. Second, when the key is left inside a house -- but within range of the antenna -- and the car is parked outside. Using the two-antenna approach, all 10 cars were successfully hacked and driven away.

The total cost for the wireless attack, not including graduate students, ranged from $100 to $1,000, depending on the quality of the hardware used. Interestingly, the cryptography used to secure the fob-to-car communications didn't matter. The researchers were able to remotely fool all 10 cars simply by rebroadcasting the signal.

To block such attacks, the researchers suggest that car manufacturers add security checks to confirm that the key really is located next to the car. "I don't see a way around it," said research lead Srdjan Capkun, an assistant professor of computer science in the system security group at ETH Zurich, quoted in MIT's Technology Review. His group is working on new approaches to help.

While the Swiss researchers' attack doesn't require cracking the encryption keys used to secure the fob-to-car communications, that's also an option. According to New Scientist, security researchers have cracked the keys used by multiple types of key fobs, including the Hitag 2 encryption key from NXP Semiconductors present in many recent cars, although that isn't the only one that's been hacked.

"The proprietary encryption keys used to transmit data between the key fob, receiver, and engine are so poorly implemented on some cars that they are readily cracked," Ari Juels of RSA Labs told New Scientist. Notably, only a few car manufacturers use 128-bit Advanced Encryption Standard (AES) keys. The rest use 40- or 48-bit keys, which security experts now regard as ineffective. Semiconductor makers report that they already have stronger approaches, but it's difficult to convince car manufacturers to use them.

Ditto for wireless car tire pressure gauges. Last year, researchers found that the wireless networks built into many cars in the past three years don't perform authentication or input validation. Researchers thus found it easy to spoof a variety of inputs, such as sensor messages indicating a tire pressure failure. According to the researchers, "we validated this experimentally by triggering tire pressure warning messages in a moving vehicle from a customized software radio attack platform located in a nearby vehicle."

What's the end result of poor automotive information security practices? The next time you finish grocery shopping and find that your car's gone, you can ask: Was it the car crypto -- or lack thereof -- that did you in? Unless a Swiss PhD candidate is lurking in the parking lot, the answer is, probably not. When it comes to bang for buck, there are easier attacks.

But wouldn't it be nice if car manufacturers properly secured their vehicles, so that every new convenience or feature doesn't add another information security attack vector?

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.