Overview
Fiat Chrysler Automobiles (FCA) UConnect may allow a remote attacker to control physical vehicle functions.
Description
According to a WIRED news article, an unknown vulnerability in FCA UConnect software allows some functions of recent models of Jeep Cherokee to be controlled by a remote attacker. Other FCA makes (including Chrysler, Dodge, and Ram) that use UConnect may also be vulnerable. FCA with the National Highway and Transportation Safety Administration (NHTSA) has initiated a safety recall (NHTSA campaign 15V461000, "Radio Software Security Vulnerabilities") for all possibly affected makes and models:
For more information, see NHTSA's report and the chronology of events leading to the recall. It appears that some UConnect systems were configured with services listening on the Sprint mobile network. An attacker would have to have access to the Sprint mobile network. FCA vehicles are designed with safety systems that mitigate, but do not completely prevent, this type of attack. The researchers Miller and Valasek have released a whitepaper detailing their findings. Previously, they talked about attack surfaces against cars at Black Hat 2014. The paper Comprehensive Experimental Analyses of Automotive Attack Surfaces, published in 2011, documents similar research, including successful experiments gaining remote control of physical vehicle functions. |
Impact
A remote attacker could control some physical functions of a vulnerable vehicle, potentially causing significant physical damage and serious or fatal injury. |
Solution
Apply an update |
Threat modeling and secure architecture
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 8.5 | AV:N/AC:M/Au:S/C:C/I:C/A:C |
Temporal | 6.7 | E:POC/RL:OF/RC:C |
Environmental | 6.2 | CDP:H/TD:M/CR:M/IR:H/AR:H |
References
- http://illmatics.com/Remote%20Car%20Hacking.pdf
- https://www.youtube.com/watch?v=MAGacjNw0Sw
- http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483033/RCAK-15V461-4967.pdf
- http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483036/RCLRPT-15V461-9407.pdf
- http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483034/RMISC-15V461-1264.pdf
- http://www.safercar.gov/Vehicle+Owners
- http://media.fcanorthamerica.com/newsrelease.do?&id=16827&mid=1
- http://wk2jeeps.com/tsb/tsb_wk2_0807215.pdf
- http://wk2jeeps.com/tsb/tsb_wk2_0803115a.pdf
- http://blog.fcanorthamerica.com/2015/07/22/unhacking-the-hacked-jeep/
- https://ics-cert.us-cert.gov/alerts/ICS-ALERT-15-203-01
- http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
- http://www.wired.com/2015/07/patch-chrysler-vehicle-now-wireless-hacking-technique/
- http://www.driveuconnect.com/software-update/
- http://www.autosec.org/pubs/cars-usenixsec2011.pdf
- http://www.mcafee.com/us/resources/white-papers/wp-automotive-security.pdf
- http://newsroom.intel.com/community/intel_newsroom/blog/2015/09/13/intel-commits-to-mitigating-automotive-cybersecurity-risks
Acknowledgements
This vulnerability was publicly demonstrated by Charlie Miller and Chris Valasek, and initially reported by WIRED magazine. Thanks to FCA for quickly working with us to issue this vulnerability note.
This document was written by Garret Wassermann and Art Manion.
Other Information
CVE IDs: | None |
Date Public: | 2015-07-21 |
Date First Published: | 2015-07-24 |
Date Last Updated: | 2015-09-14 16:39 UTC |
Document Revision: | 79 |