Car alarms with security flaws put 3 million vehicles at risk of hijack

Two popular car alarm systems have fixed security vulnerabilities that allowed researchers to remotely track, hijack and take control of vehicles with the alarms installed.
The systems, built by Russian alarm maker Pandora and California-based Viper or Clifford in the U.K., were vulnerable to an easily manipulated server-side API, according to researchers at Pen Test Partners, a U.K. cybersecurity company. In their findings, the API could be abused to take control of an alarm systems user account and their vehicle.
Its because the vulnerable alarm systems could be tricked into resetting an account password because the API was failing to check if it was an authorized request, allowing the researchers to log in.
Although the researchers bought alarms to test, they said anyone could create a user account to access any genuine account or extract all the companies user data.
The researchers said some three million cars globally were vulnerable to the flaws, since fixed.

In one example demonstrating the hack, the researchers geolocated a target vehicle, track it in real-time, follow it, remotely kill the engine and force the car to stop, and unlock the doors. The researchers said it was trivially easy to hijack a vulnerable vehicle. Worse, it was possible to identify some car models, making targeted hijacks or high-end vehicles even easier.
According to their findings, the researchers also found they could listen in on the in-car microphone, built-in as part of the Pandora alarm system for making calls to the emergency services or roadside assistance.
Ken Munro, founder of Pen Test Partners, told TechCrunch this was their biggest project.
The researchers contacted both Pandora and Viper with a seven-day disclosure period, given the severity of the vulnerabilities. Both companies responded quickly to fix the flaws.
When reached, Vipers Chris Pearson confirmed the vulnerability has been fixed. If used for malicious purposes, [the flaw] could allow customers accounts to be accessed without authorization.
Viper blamed a recent system update by a service provider for the bug and said the issue was quickly rectified.
Directed believes that no customer data was exposed and that no accounts were accessed without authorization during the short period this vulnerability existed, said Pearson, but provided no evidence to how the company came to that conclusion.
In a lengthy email, Pandoras Antony Noto challenged several of the researchers findings, summated: The systems encryption was not cracked, the remotes where not hacked, [and] the tags were not cloned, he said. A software glitch allowed temporary access to the device for a short period of time, which has now been addressed.
The research follows Outdoor Techs Chips ski helmet speakers are a hot mess of security flaws
See also:
Leave a comment
  • Latest
  • Read
  • Commented
Calendar Content
«     2019    »