Hyundai Blue Link Vulnerability Allows Remote Start of Cars

Car maker Hyundai patched a vulnerability in its Blue Link software, which could potentially allow attackers to remotely unlock a vehicle and start it.



A vulnerability discovered in Hyundai Motor's Blue Link app software could potentially allow cyberattackers to gain control of the vehicle, according to security researchers at Rapid7.

Hyundai, the latest car maker to be hit with a vulnerability in its connected car software, has since patched the vulnerability after receiving notice from Rapid7. No known compromises have occurred because of the flaw, Hyundai Motor America and Rapid7 noted in a statement.

The car maker's Blue Link application software version 3.9.4, which was released Dec. 8, and its version 3.9.5 could allow an attacker to exploit the vulnerability over an insecure WiFi connection, or man-in-the-middle attack.

Once exploited, an attacker could capture usernames, passwords, and PINs, then remotely locate the Hyundai vehicle, unlock it, and then start its engine, Rapid7 noted in its report. The car maker is not alone with its connected software problems. In 2015, Fiat Chrysler recalled 1.4 million vehicles that had its UConnect Infotainment systems, after it was discovered attackers could remotely take control of the vehicles' steering and braking.

Read more about Hyundai's Blue Link vulnerability here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2021 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service