• PenguinTD@lemmy.ca
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    1 day ago

    It’s a serious security hole cause the software can be updated through network, the version gets audit and all the follow up update can be good, but the moment it needs to go rogue you just need 1 malicious update to have serious and wide spread harm/attack on a button.

    IMO for any vehicles to allow over the network update is beyond stupid. (yes, that includes Tesla.)

    • Nik282000@lemmy.ca
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      There are a few good defcon talks where it has been shown that the engine control and body control can be accessed and modified via the “infotainment” system (the one I saw specifically was Jeeps).

      • Clearwater@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 day ago

        Once you’re inside a car that’s on, there really isn’t any security*. The OBD2 port that every remotely modern car has is perfectly capable of accessing all the diagnostics and data streams the car has, and can also control/reconfigure the various computers.

        IMO that doesn’t really matter, since the system isn’t powered until the key is in the ignition and the car turned on. You can’t do anything with the key off, and if your passenger wanted to sabotage the car, they’d just yank the wheel as you drive down the highway.

        That said, yes OTA updates are a travesty. Specifically because cars have so little security, having any access to their computers from the outside is a massive risk… And if there’s a potential that the country the manufacturer is in turns hostile, that risk certainly isn’t reduced.

        * A handful of manufacturers have “added” security to their systems by… (drumroll pls) restricting access to the systems and requiring a subscription for full access. That’s fucking evil and doesn’t even do anything (at least for a mechanic or tinkerer like me) since you can just google “FCA bypass cable” and skip right past the firewall.

        • Nik282000@lemmy.ca
          link
          fedilink
          arrow-up
          1
          ·
          16 hours ago

          Modern cars expose the engine/body control CAN bus through the fucking headlights. You don’t need to be in the car and it doesn’t need to be on for you to have the same or more access than the OBDII port.

          It doesn’t matter what the country of origin is, someone is gonna find a way to break OTA updates, gain access via exposed wireless networks or just pop off a CAN bus controlled light and plug in. How long before someone pushes a malicious update that causes the ABS to disable or degrade braking to near 0%, or just throw the electronic power steering full left whenever the speed exceeds 101km/h?

          • Lemmyoutofhere@lemmy.ca
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            9 hours ago

            Only Toyota was dumb enough to have a CAN bus run to the headlights. Edit: and use the same bus the keyless system runs on.

          • ProgrammingSocks@pawb.social
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            11 hours ago

            But that would be silly, because the easiest way to kill someone without consequence is to get behind the wheel and run them over. People could also be putting bombs in product boxes and poison in medicine. A coherent society doesn’t have these problems.

            • Nik282000@lemmy.ca
              link
              fedilink
              arrow-up
              1
              ·
              10 hours ago

              Forgot about wanacrypt, stuxnet or the Ashley Madison breach? indiscriminate harm is the norm not the exception.