10.7 C
London
Wednesday, March 22, 2023

This remote keyfob hack could leave Honda’s past decade vulnerable

Must read

Video shows Virginia deputies and medical personnel appearing to pile on top of him

Video capturing some of the last moments in the life of Irvo Otieno — whose death led to murder charges against seven Virginia sheriff's...

Instagram Brings Ads to Search Results and Launches ‘Reminder Ads’

Meta is introducing two new tools to Instagram designed to open up additional advertising opportunities as the company struggles with weak advertising demand. ...

Daily Crunch: Bing allows users to generate images using ‘cutting edge DALL-E models’

To get a roundup of londonbusinessblog.com's biggest and most important stories delivered to your inbox every day at 3PM PDT, register here. Happy Tuesday Crunch,...

Why resilience is essential for founders and startups

In today's business landscape, where the speed of disruption is accelerating and the fickle nature of consumer preferences leaves little room for error, a...
Shreya Christinahttps://londonbusinessblog.com
Shreya has been with londonbusinessblog.com for 3 years, writing copy for client websites, blog posts, EDMs and other mediums to engage readers and encourage action. By collaborating with clients, our SEO manager and the wider londonbusinessblog.com team, Shreya seeks to understand an audience before creating memorable, persuasive copy.

Security researchers and The rideRob Stumpf’s recently hebben posted videos of herself unlocking and remotely starting several Honda vehicles using portable radios, despite the company’s insistence that the cars have security guards intended to deter attackers from doing just that. According to the researchers, this hack is made possible by a vulnerability in the keyless entry system in many Hondas made between 2012 and 2022. named the vulnerability Rolling-PWN

The basic concept for Rolling-PWN is similar to attacks we’ve seen before against VWs and Teslas, as well as against other devices; using radio equipment, someone picks up a legitimate radio signal from a key fob and then transmits it back to the car. It’s called a replay attack, and if you think it should be possible to defend against this kind of attack with some sort of cryptography, you’re right. In theory, many modern cars use a so-called ‘rolling key’ system, which basically means that each signal only works once; you press the button to unlock your car, your car will be unlocked and that exact signal should never unlock your car again.

But if jalopnik points out, not every recent Honda has that level of protection. Researchers have also found vulnerabilities where surprisingly recent Hondas (particularly 2016 to 2020 Civics) have a unencrypted signal that does not change† And even those that do have a rolling code system — including the 2020 CR-V, Accord and Odyssey, Honda tells Vice — could be vulnerable to the recently discovered attack. Rolling-PWN’s website has videos of the hack used to unlock those vehicles with rolling code, and Stumpf was able to… well, almost a 2021 agreement pwn with the exploit, enable the engine remotely and then unlock it.

Honda told The ride that the security systems it puts in its keychains and cars “would not allow the vulnerability as depicted in the report” to run. In other words, the company says the attack shouldn’t be possible — but it’s clear it somehow is. We asked the company for comment on The ride‘s demonstration, which was published Monday, but which did not immediately respond.

According to the Rolling-PWN website, the attack works because it’s able to resync the car’s code counter, meaning it accepts old codes — basically because the system is built to have some tolerances (so you can use your keyless entry even if the button is pressed once or twice while you are away from the car, so the car and the remote control remain in sync), the security system can be disabled. The site also claims it affects “all Honda vehicles currently on the market,” but admits it has only been tested in a handful of model years.

Even more worryingly, the site suggests other makes of cars are also affected, but is vague on the details. While it makes me nervous about my Ford, it’s probably a good thing – if the security researchers follow standard responsible disclosure procedures, they should contact automakers and give them a chance to address the issue before details are made public. . According to jalopnikthe investigators would have contacted Honda but were told to file a report with customer service (which are not exactly standard security practices).


More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest article

Video shows Virginia deputies and medical personnel appearing to pile on top of him

Video capturing some of the last moments in the life of Irvo Otieno — whose death led to murder charges against seven Virginia sheriff's...

Instagram Brings Ads to Search Results and Launches ‘Reminder Ads’

Meta is introducing two new tools to Instagram designed to open up additional advertising opportunities as the company struggles with weak advertising demand. ...

Daily Crunch: Bing allows users to generate images using ‘cutting edge DALL-E models’

To get a roundup of londonbusinessblog.com's biggest and most important stories delivered to your inbox every day at 3PM PDT, register here. Happy Tuesday Crunch,...

Why resilience is essential for founders and startups

In today's business landscape, where the speed of disruption is accelerating and the fickle nature of consumer preferences leaves little room for error, a...

Future Apple Watches could automatically pair with their bands

Imagine swapping out a bright pink Apple Watch band for an earth-toned green one, and your watch face automatically changes to a matching color,...