Flaws in smart car alarms exposed 3 million cars to hijack

Cyber Security

The vulnerabilities, which resided in associated smartphone apps, were both easy to find and easy to fix

Two smart alarm systems for cars have plugged critical security holes that put three million vehicles globally at risk of being hijacked, research by Pen Test Partners reveals.

If exploited, the vulnerabilities would have enabled anyone to turn the alarm off, as well as track and unlock the car fitted with it. In some cases, the researchers were also able to snoop on in-car conversations through a microphone that is built into one of the alarm systems, and even to start the car’s engine or cut it off while the car was moving.

The flaws affected alarm systems that enable control of connected cars via associated smartphone apps and that are made by two companies – Pandora, from Russia, and Viper, based in the United States (and branded as Clifford in the United Kingdom). The former had even touted its products as “unhackable”, according to Pen Test Partners.

Easy to find, easy to fix

The researchers found that both apps’ APIs (application programming interfaces) failed to properly authenticate some requests, notably requests to change the password or email address. This paved the way for a full-on account takeover.

“Simply by tampering with parameters, one can update the email address registered to the account without authentication, send a password reset to the modified address (i.e. the attacker’s) and take over the account,” they wrote. With the account in their hands, the ethical hackers were also able to seize control of the car linked to the account.

Additionally, while the researchers actually bought the alarm systems for the sake of “a full proof of concept”, they said that anyone could simply set up a test account to compromise a genuine account. “Both products allow anyone to create a test/demo account. With that demo account it’s possible to access any genuine account and retrieve their details,” according to Pen Test Partners, who called the flaws “easy to find, easy to fix”.

To their credit, the two companies acknowledged the bugs and patched them within days of receiving alerts from the white hats.





Products You May Like

Articles You May Like

How MVISION Mobile can combat the WhatsApp Buffer Overflow Vulnerability
How an immigration crackdown is hurting UK startups
Report Reveals TeamViewer Was Breached By Chinese Hackers In 2016
Game of Thrones petition reaches 1M signatures ahead of finale
Survey: What should companies do to restore trust post-breach?

Leave a Reply

Your email address will not be published. Required fields are marked *