(no title)
mothsonasloth | 2 years ago
I would imagine my Passat which has a CAN interface on the headlight cluster would be vulnerable to this attack as well. Maybe even the bonnet sensor could be vulnerable.
Car manufacturers could remove CAN interfaces from peripheral systems (lights, wing mirrors) but they probably won't because it would make maintenance a little harder and less cost effective.
The idea of a software update by the security researchers sounds sensible but updating ECUs (engine control units), CCU (climate comfort units), infotainment systems of legacy cars will not happen.
Say goodbye to the old car thieves with their manual tools, hello techy thieves.
jon-wood|2 years ago
TheLoafOfBread|2 years ago
zamnos|2 years ago
There are rumors that the algorithm and secret key for various manufacturers has been broken, and that any car with a remote can be stolen after recording the unlock and start sequence from nearby. But if you had the code that would do that, it's not like you'd upload it to GitHub, so that rumor remains just that, a rumor.
mhandley|2 years ago
wildzzz|2 years ago
illiarian|2 years ago
There are over 100 issues (aka bugs) in the spec though. Uncovered by these guys: https://youtu.be/zi0rHwfiX1Q?t=1150 (starting at 19:10, includes examples)