Car maker Hyundai patched a vulnerability in its Blue Link software, which could potentially allow attackers to remotely unlock a vehicle and start it.
A vulnerability discovered in Hyundai Motor's Blue Link app software could potentially allow cyberattackers to gain control of the vehicle, according to security researchers at Rapid7.
Hyundai, the latest car maker to be hit with a vulnerability in its connected car software, has since patched the vulnerability after receiving notice from Rapid7. No known compromises have occurred because of the flaw, Hyundai Motor America and Rapid7 noted in a statement.
The car maker's Blue Link application software version 3.9.4, which was released Dec. 8, and its version 3.9.5 could allow an attacker to exploit the vulnerability over an insecure WiFi connection, or man-in-the-middle attack.
Once exploited, an attacker could capture usernames, passwords, and PINs, then remotely locate the Hyundai vehicle, unlock it, and then start its engine, Rapid7 noted in its report. The car maker is not alone with its connected software problems. In 2015, Fiat Chrysler recalled 1.4 million vehicles that had its UConnect Infotainment systems, after it was discovered attackers could remotely take control of the vehicles' steering and braking.
Read more about Hyundai's Blue Link vulnerability here.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024