Tuesday, October 8, 2024
HomeCyber Security NewsTelsa Flaw Let Attackers to Steal Vehicles in Minutes

Telsa Flaw Let Attackers to Steal Vehicles in Minutes

Published on

90 seconds and $195 is all it takes to steal your brand new $100,000 Tesla Model X!!

Computer Security and Industrial Cryptography (COSIC) Researchers from the University of Leuven, Belgium have discovered a few major security flaws in the keyless entry system of the Tesla Model X.

Tesla Model S was also hacked by the same research group and now they have demonstrated that the security system of the Model X too can be bypassed.

- Advertisement - EHA

Hacking Demo:

The Tesla Model X’s key fob allows the owner to automatically unlock their car by approaching the car or at the press of a button. The key fob is woken up when the attacker is within 5 meters, and once this is done the attacker sends his own software to the key fob to unlock the vehicle.

Once this is done the diagnostic connector inside the vehicle is accessed and a modified key fob is paired to the car, and this allows the attacker to start the car and drive away.

How does the principle work?

Usually, keyless entry in a car is facilitated by the use of Bluetooth Low Energy (BLE) and Tesla Model X is no different. Using a modified Electronic Control Unit (ECU), obtained from a salvage Tesla Model X, we were able to wirelessly (up to 5m distance) force key fobs to advertise themselves as connectable BLE devices.

By reverse-engineering the Tesla Model X key fob we discovered that the BLE interface allows for remote updates of the software running on the BLE chip.

As this update mechanism was not properly secured, we were able to wirelessly compromise a key fob and take full control over it. Subsequently, we could obtain valid unlock messages to unlock the car later on”, says Lennert Wouters, a Ph.D. student at the COSIC research group.

Step by step guide to hack a Tesla Model X

Below is a video released by COSIC on Youtube to showcase the entire operation being carried out

This was a proof of concept attack and till now no real-world attacks have been reported. Tesla was informed of this security flaw on the 17th of August this year, and Tesla will be rolling out a fix for this bug as part of their 2020.48, over the air software update.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Facebook Taken Down Number of Political ads due to Technical Flaws in their System

Cisco Fixes High-severity Flaws in Webex, IP Cameras and ISE

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Gained Unauthorized Network Access to Casio Networks

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network...

Open-Source Scanner Released to Detect CUPS Vulnerability

A new open-source scanner has been released to detect a critical vulnerability in the...

Comcast Cyber Attack Impacts 237,000+ Users Personal Data

Comcast Cable Communications LLC has reported that over 237,000 users' data has been compromised....

American Water Works Cyber Attack Impacts IT Systems

American Water Works Company, Inc., a leading provider of water and wastewater services, announced...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Gained Unauthorized Network Access to Casio Networks

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network...

Open-Source Scanner Released to Detect CUPS Vulnerability

A new open-source scanner has been released to detect a critical vulnerability in the...

Comcast Cyber Attack Impacts 237,000+ Users Personal Data

Comcast Cable Communications LLC has reported that over 237,000 users' data has been compromised....