Because of this factory defect, the Tesla Model X is prone to theft and piracy.
Articles

Because of this factory defect, the Tesla Model X is prone to theft and piracy.

A Belgian researcher has figured out how to clone a Tesla Model X key with about $300 worth of hardware.

Automakers work hard to reduce the chance hackers can steal their cars. However, this is a constant battle between the people who build the systems in the vehicles and those who want to exploit them.

Luckily for , the latest pair of unintended flaws known to computer geeks as "exploits" have been discovered by a security researcher who is happy to share his findings.

According to information from Car and Driver, Wired reported on security researcher Lennert Wouters of KU Leuven University in Belgium who discovered a couple of vulnerabilities that allow the researcher to not only get into a Tesla, but also start it and walk away. . Wouters disclosed the vulnerability to Tesla in August, and the automaker told Wouters that an over-the-air patch may take a month to deploy to affected vehicles. For Wouters' part, the researcher says that he will not publish the code or the technical details necessary for anyone else to carry out this trick, however, he did publish a video demonstration of the system in action.

To steal a Model X in a matter of minutes, two vulnerabilities need to be exploited. Wouters started with a hardware kit for about $300 that fits in a backpack and includes an inexpensive Raspberry Pi computer and a Model X Body Control Module (BCM) he bought on eBay.

It is BCM that allows these exploits to be used even if they are not on the target vehicle. It acts as a trusted hardware that allows both exploits to be used. With it, Wouters is able to intercept the Bluetooth radio connection that the key fob is using to unlock the vehicle using the VIN and by approaching the target vehicle's key fob within 15 feet. At this point, your hardware system overwrites the target's key fob firmware and you can access the secure enclave and obtain the code to unlock the Model X.

Essentially, Wouters can create a Model X key by knowing the last five digits of the VIN that is visible on the windshield and standing next to that car's owner for about 90 seconds while his portable setup clones the key.

Once in the car, Wouters must use another exploit to start the car. By accessing a USB port hidden behind a panel below the display, Wouters can connect his backpack computer to the car's CAN bus and tell the car's computer that his fake key fob is valid. Once this is done, the Model X assumes the car has a valid key, voluntarily turns on the power, and is ready to drive.

The problem is that the keyfob and BCM, when connecting to each other, do not take the extra step of checking for firmware updates on the keyfob, giving the researcher access to the key, pretending to press new. “The system has everything you need to be safe,” Wouters told Wired. “And there are also small bugs that allow me to bypass all the security measures,” he added.

**********

:

Add a comment