Mitsubishi Outlander Just The Latest 'Smart' Car That's Trivial To Hack And Control
from the not-so-smart dept
Yet another vehicle heavily advertised as being “smart” has proven to be notably less secure than its older, dumber counterparts. This week, researchers discovered that flaws in the Mitsubishi Outlander leave the vehicle’s on-board network vulnerable to all manner of hacker attack, allowing an intruder to disable the alarm system, drain the car’s battery, control multiple vehicle functions, and worse.
The app for most “smart” vehicles connects to a web-based service hosted by the manufacturer. This service in turn connects to a GSM module inside of the automobile, letting a user control the vehicle from anywhere. While convenient, this has proven to be problematic when poorly implemented — something Nissan recently discovered after the company failed to implement any real authentication, letting an attacker use the Leaf app to track a driver’s driving behavior, physically control the Leaf’s heating and cooling systems, and drain the car’s battery.
Analysis of the Mitsubishi Outlander’s security flaw found that Mitsubishi did things differently, requiring users connect to an on-board Wi-Fi hotspot before controlling the vehicle using the associated app (presumably to save money on an online hosting service). But the researchers found that the Wi-Fi key was relatively trivial to hack:
“The Wi-Fi pre shared key is written on a piece of paper included in the owners? manual. The format is too simple and too short. We cracked it on a 4 x GPU cracking rig at less than 4 days. A much faster crack could be achieved with a cloud hosted service, or by buying more GPUs.”
Given the embedded access point has a unique SSID, an attacker can use public resources like Wigle.net to easily geolocate any Outlander PHEVs they might like to target. With the PSK and the SSID, the security firm was able to compromise the remainder of the car’s rudimentary security using a man-in-the-middle attack to sniff the traffic flowing between the car and the app. Once inside, researchers noted that like the Leaf hack they could drain the car’s battery, turn various vehicle functions on and off, and turn off the alarm. But they also note the vulnerability goes much deeper than with the Leaf:
“Once unlocked, there is potential for many more attacks. The on board diagnostics port is accessible once the door is unlocked. Whilst we haven?t looked in detail at this, you may recall from a hack of some BMW vehicles which suggested that the OBD port could be used to code new keys for the car. We also haven?t looked at connections between the Wi-Fi module and the Wi-Fi module and the Controller Area Network (CAN). There is certainly access to the infotainment system from the Wi-Fi module. Whether this extends to the CAN is something we need more time to investigate.”
Like with so many vulnerabilities, the researchers say that when they brought the problem to the attention of Mitsubishi, the company showed “disinterest” in a dialogue. At least until they contacted the BBC, at which point Mitsubishi got chatty:
“Initial attempts by us to disclose privately to Mitsubishi were greeted with disinterest. We were a bit stumped at this point: As so often happens, the vendor takes no interest and public disclosure becomes an ethical dilemma. So, we involved the BBC who helped us get their attention. Mitsubishi have since been very responsive to us! They are taking the issue very seriously at the highest levels.”
We’ve noted for a few years now that in-car security — as with most products on board the “internet of things” hype train — is aggressively atrocious. And it’s not really clear it’s getting any better despite several government warnings and bad press. Many car manufacturers still aren’t quick to respond to disclosures, and even if they can, they often take far too long to patch problems when found. That’s of great benefit to government, private or criminal entities that surely appreciate the easy new way to spy on, stall or even potentially kill via methods most police departments likely don’t have the chops to adequately investigate.