Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/19/2016
01:35 PM
Cameron Camp
Cameron Camp
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Deconstructing Connected Cars: A Hack Waiting To Happen

Why your automobile's simple and reliable Controller Area Network will put you at risk in the brave new world of connected and autonomous driving.

Car hacking would be as hard to explain to classic car buffs as hacking a bicycle would be to a ten year-old. But today’s cars are able to drive, stop, and park with computer assistance or total control. Step on the brake and it’s likely you are interacting with an invisible computerized driver rather than your car itself. If computers are really doing the driving, then they, rather than you, become hacking targets. Lose control of that computer, and dangerous things can happen.

But the computers found in autonomous vehicles and smart cars are not what you’d find on your laptop or even your mobile device. Rewind five or ten years, and think of specific computers performing unique, dedicated tasks, like moving a lever or switch. They don’t need to be able to do your taxes, just open a valve.

Now imagine the kind of network that would tie together all these simple devices to form a complete working car, kind of a constellation of dedicated computers driving at the speed limit down a road. This network—typically a Controller Area Network—is simple and extremely reliable, and present in all contemporary autos. Reliable car systems are the bedrock of the automotive industry, but leveled against modern hacking techniques, they also can provide a very reliable hacking surface. Without better security, autonomous and connected vehicles put passengers at risk of car hacking and even demands from ransomware proliferators.

The problem with being “too” connected
The average new car in 2015 contained more than 30 microprocessors, and the security of those embedded systems is severely challenged by in-vehicle internet connectivity, according to a recent report by VDC research. The same report states that by 2020, more than three-quarters of new vehicles will have internet connectivity through an embedded modem and/or a smartphone interface.

The basic flaw in autonomous vehicles is the vulnerability that results from all systems being interconnected. The Controller Area Network, or CAN bus, runs the important things in a car like engine and transmission controls, as well as the system you’ll interact most with: the infotainment computer on your dashboard. The infotainment system is often tied to the internet to enable you to get directions. If the infotainment system intersects both the CAN bus and the internet, suddenly over-the-air hacks become more of a reality if the bus is left unsecured. This is the most worrisome repercussion of connected car hacking -- possibly affecting your vehicle unbeknownst to you while you drive down the road.

Prior to the infotainment system interacting with the CAN bus, you’d need physical access to the vehicle to tell things on the CAN bus what to do. But more modern infotainment systems have the ability to change things directly on the CAN bus and not just monitor them (like your fuel level), allowing a significant attack surface to present itself.

Protecting autonomous and connected vehicles against cyberattacks
So how can automakers protect against attacks from a cyber enemy? If the recent hacking of connected vehicles has taught us anything, it’s time for the CAN bus to get a security overhaul using the lessons learned from every other commercial network in the world over the past five years: by putting network security best practices in place. By determining the authenticity of commands sent across the CAN bus, and preventing rogue ones from being acted upon, the CAN bus – and therefore your car – becomes exponentially safer. That won’t help older automobiles, but security add-ons are available, to an extent.

The next step is locking down the infotainment system from having unlimited read/write access to critical vehicle control systems by accessing the CAN bus. And just in case you thought CAN buses were only for cars, there is a new round of electronic products for bicycles that use it as well. Now THAT would blow a 10-year-old’s mind.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Cameron Camp is a researcher for global security provider ESET, and has played a critical role in growing the ESET North America Research Lab. Cameron has been building critical technology infrastructures for more than 20 years, beginning as an assembly language programmer in ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14832
PUBLISHED: 2019-10-15
A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
CVE-2017-10022
PUBLISHED: 2019-10-15
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing ...
CVE-2019-10759
PUBLISHED: 2019-10-15
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10760
PUBLISHED: 2019-10-15
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-17397
PUBLISHED: 2019-10-15
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.