• Edition
  • United States
  • Africa
  • ASEAN
  • Australia
  • India
  • Middle East
  • Netherlands
  • New Zealand
  • United Kingdom
  • News & Analysis
  • Buyer’s Guides
  • CIO50 2021 Awards
  • Sign up for CIO Newsletters
  • Resource Library
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • From Our Advertisers
  • Menu
  • News & Analysis
  • Buyer’s Guides
  • CIO50 2021 Awards
  • Sign up for CIO Newsletters
  • Resource Library
  • Analytics
  • Careers
  • Cloud Computing
  • Digital Transformation
  • Diversity and Inclusion
  • Enterprise Applications
  • Innovation
  • IT Leadership
  • IT Management
  • IT Operations
  • IT Strategy
  • Project Management
  • From Our Advertisers
  • SIGN IN
  • REGISTER
Type your search and hit enter
×
 

Learn about Insider

Help

Member Preferences

  • News
  • Leadership
  • Digital Transformation
  • CIO50 Awards
  • From Our Partners
Menu CIO
Researchers demonstrate remote attack against Tesla Model S

Researchers demonstrate remote attack against Tesla Model S

The researchers were able to remotely control the breaking system, sunroof, door locks, trunk, side-view mirrors and more

Lucian Constantin Lucian Constantin (IDG News Service) 21 September, 2016 00:55
  • share
  • print
  • email
Comments

Tesla Motors is considered one of the most cybersecurity-conscious car manufacturers in the world -- among other things, it has a bug bounty program. But that doesn't mean the software in its cars is free of security flaws.

Researchers from Chinese technology company Tencent found a series of vulnerabilities that, when combined, allowed them to remotely take over a Tesla Model S car and control its sunroof, central display, door locks and even the breaking system. The attack allowed the researchers to access the car’s controller area network (CAN) bus, which lets the vehicle’s specialized computers communicate with each other.

"As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars," the researchers from Tencent's Keen Security Lab said in a blog post Monday. "We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected."

The blog post is accompanied by a demonstration video in which the researchers show what they can achieve through their attack, which works either while the car is parked or being driven.

First, while the car was parked, the researchers used a laptop to remotely open its sunroof, activate the steering light, reposition the driver's seat, take over the dashboard and central display and unlock the car.

In a second demonstration, they turned on the windshield wipers while the car was being driven at low speed in a parking lot for demonstration purposes. They also showed that they can open the trunk and fold the side-view mirror when the driver is trying to change lanes. While these operations can be distracting to the driver in certain situations, causing a safety risk, the most dangerous thing they were able to do was to engage the car's breaking from 12 miles away.

Such an attack, performed against a car being driven at high speed on a highway, could result in a serious rear-end collision.

The researchers reported all of the vulnerabilities through Tesla's bug bounty program, and the company is working on patches. Fortunately, Tesla cars can receive firmware updates remotely and Tesla car owners are advised to make sure that their vehicles are always running the latest software version.

Car hacking has become a hot topic in recent years among security researchers, regulators and car manufacturers themselves. As cars become more interconnected, the ways in which they can be remotely hacked will only increase, so it's important that the computers handling critical safety features are isolated and protected.

Within ten days of being notified, Tesla released an over-the-air software update (v7.1, 2.36.31) to fix these security vulnerabilities, a Tesla representative said via email.

"The issue demonstrated is only triggered when the web browser is used, and also required the car to be physically near to and connected to a malicious wifi hotspot," the representative said. "Our realistic estimate is that the risk to our customers was very low, but this did not stop us from responding quickly."

How to choose a Standby Office for your Business Continuity
More from Plan B

Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or
  • Sign in with LinkedIn
  • Sign in with Facebook

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Automotive

More about CANTesla

Related Whitepapers

Show Comments

Read next

  • Digital ethics and privacy emerge as top tech trend to prepare for ...

  • CIO spotlight: Glen McLatchie of SkyCity

  • CIO50 2020 #26-50: Andrew Haddad, Vodafone New Zealand

  • In pictures: CIO roundtable on 'building an AI-driven business'

  • The top 10 tech and digital chiefs in New Zealand

CIO50 2021 #1: Mandy Simpson, Z Energy
The voice of IT leadership
  • Policies
    • Privacy Policy
    • Cookie Policy
    • Member Preferences
    • About AdChoices
    • Your California Privacy Rights
  • About
    • About Us
    • Contact Us
    • IDG Careers
    • Reprints
    • Newsletters
  • More from CIO
    • News

      Reviews

      Buyer's Guides

      Blogs/Opinion

      Podcasts

      Awards programs

  • Digital magazine
    • View the archive

Copyright © 2022 IDG Communications, Inc.
Top Of Page