Page 101 - Cyber Warnings August 2017
P. 101
Tesla Compromise #2
Here we go again
by Charles Parker, II
Technology advances have improved the devices and user experience (UX) in many of the
vehicle models being manufactured. These advances have been manifested with the vast
improvements with mechanical, electrical, and the infotainment system.
One aspect of this that has garnered attention in the public eye has been the infotainment
system within the vehicles. These allow the person to change the temperature, monitor the tire
air pressure, call others, received directions, and receive alerts as to the vehicle status. A
functionality that has been embraced by vehicle owners continues to be the connectivity. This
allows the owner to start the vehicle from their office or living room, check on the car’s status
from across the country, or lock/unlock the car’s doors. This newer technology has allowed the
consumer to be in more control with their vehicle.
Connectivity Vulnerability
Although this is a clear benefit, there have been risks with this. The recent vehicle attacks have
focused on this portion of the attack surface. As a further testament of this, Tesla has had its
issues.
Keen Security Lab, a division of Tencent, researched the Tesla vehicle for months. This
extended period allowed for the extended testing for the Model S, P85, and 75D. This slow and
systemic testing provided time to fully test these models and systems. This testing allowed for
the vulnerability and exploit to be elaborated, elucidated, and expounded upon.
This is differentiated from the first attack, which was essentially a physical attack and attempt to
breach the vehicle’s system. With the first attack, the third party was required to pull a section of
the dash back and connect the laptop to the vehicle with a patch cord, which was plugged into
the car. This attack was far from simple or short in duration. The second attack focused more on
a common vulnerable point. With many other attacks, the connectivity and WiFi for the vehicle
was proven to be vulnerable.
Attack
Specifically the Tesla Model S was analyzed at lengths by the Keen Security Lab. This model
had a vulnerability that could be exploited remotely. This was tested at 12 miles from the
vehicle. This attack focused on the CANbus of the vehicle. Once compromised, the attackers
could control many functions of the vehicle. For this to function, the vehicle must be connected
to the malicious WiFi hotspot. This is the key and the method of attack. Once the vehicle
connects to the hotspot, the attacker enters through this connection with the browser in the
infotainment system.
101 Cyber Warnings E-Magazine – August 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.