Tesla vulnerability: Researchers hack Model X with a copied radio key



[ad_1]

When Elon Musk unveiled the Model X five years ago, Tesla’s boss was particularly proud of the gullwing doors. The so-called Falcon Wings of the electric SUV open as soon as you approach the car. The idea: Vehicle owners can, for example, have their children sit directly in the back seat and store their groceries without having to laboriously open the car.

The problem: The € 90,000 car radio key can obviously be fooled. According to their own statements, the researchers from KU Leuven managed to decipher the so-called keyless locking system of a Tesla Model X, start the car and drive away with it. This is the third time the Belgians have outsmarted Tesla’s locking technology. Two years ago they had already cloned a Tesla Model S key in less than two seconds, and then again the improved version from Tesla.

For the Model X experiment, the researchers said they first removed a control unit from a Tesla truck. From this component and a Rasperry Pi minicomputer, they tinkered a box with a radio transmitter for under $ 200 to trick the real car key into the right vehicle.

This is also the problem of the method, which is difficult to implement in practice. Because with the bulky control block, which is about the size of a shoebox, thieves must first get within five meters of the real car key to simulate an upcoming upgrade.

Keyless locking systems under fire

But if it worked and the connection between the key and the control block is fine, then the rest of the work would be very quick. Loading the malware onto the key takes about 90 seconds and even works from a distance of up to 30 meters. The manipulated software update eventually forces the key to transmit the opening codes to the control box. According to the scientists, all doors could be opened with these codes.

Scientists covertly introduced the malware via Bluetooth Low Energy wireless technology, which, in addition to Tesla, many other automakers also use for the key signal. This means, for example, that the apps on the smartphone can also be used to unlock the car. However, keyless locking systems are repeatedly criticized. Last year, ADAC warned thieves would have fun with the technology.

Inside the Tesla Model X, researchers exploited another security flaw. They plugged the converted ECU into a socket that the workshop technicians usually use for diagnosis and were then able to start the car with a modified key and the intercepted opening code – and go.

Tesla has now fixed the security holes with an update. According to the scientists, the error will be eliminated with software version 2020.48, which has been distributed to cars over WiFi for about two weeks. In August, the research team reported the two problems to the automaker and was rewarded with a payment from the bug bounty program. Tesla was worth $ 5,500 for the hack.

Icon: the mirror

[ad_2]
Source link