Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates

Avatar
Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited, could have allowed remote control over key functions simply by using only a license plate. “These attacks could be executed remotely on any hardware-equipped vehicle in about 30 seconds, regardless of whether it had an active Kia Connect subscription,” security
[[{“value”:”

Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited, could have allowed remote control over key functions simply by using only a license plate.

“These attacks could be executed remotely on any hardware-equipped vehicle in about 30 seconds, regardless of whether it had an active Kia Connect subscription,” security researchers Neiko Rivera, Sam Curry, Justin Rhinehart, and Ian Carroll said.

The issues impact almost all vehicles made after 2013, even letting attackers covertly gain access to sensitive information including the victim’s name, phone number, email address, and physical address.

Essentially, this could then be abused by the adversary to add themselves as an “invisible” second user on the car without the owner’s knowledge.

The crux of the research is that the issues exploit the Kia dealership infrastructure (“kiaconnect.kdealer[.]com”) used for vehicle activations to register for a fake account via an HTTP request and then generate access tokens.

The token is subsequently used in conjunction with another HTTP request to a dealer APIGW endpoint and the vehicle identification number (VIN) of a car to obtain the vehicle owner’s name, phone number, and email address.

What’s more, the researchers found that it’s possible to gain access to a victim’s vehicle by as trivially as issuing four HTTP requests, and ultimately executing internet-to-vehicle commands –

Generate the dealer token and retrieve the “token” header from the HTTP response using the aforementioned method
Fetch victim’s email address and phone number
Modify owner’s previous access using leaked email address and VIN number to add the attacker as the primary account holder
Add attacker to victim vehicle by adding an email address under their control as the primary owner of the vehicle, thereby allowing for running arbitrary commands

“From the victim’s side, there was no notification that their vehicle had been accessed nor their access permissions modified,” the researchers pointed out.

“An attacker could resolve someone’s license plate, enter their VIN through the API, then track them passively and send active commands like unlock, start, or honk.”

In a hypothetical attack scenario, a bad actor could enter the license plate of a Kia vehicle in a custom dashboard, retrieve the victim’s information, and then execute commands on the vehicle after around 30 seconds.

Following responsible disclosure in June 2024, the flaws were addressed by Kia as of August 14, 2024. There is no evidence that these vulnerabilities were ever exploited in the wild.

“Cars will continue to have vulnerabilities, because in the same way that Meta could introduce a code change which would allow someone to take over your Facebook account, car manufacturers could do the same for your vehicle,” the researchers said.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

“}]] The Hacker News 

Total
0
Shares
Previous Post

Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar

Next Post

Dallas suburb working with FBI to address attempted ransomware attack

Related Posts

Critical Security Flaw in WhatsUp Gold Under Active Attack – Patch Now

A critical security flaw impacting Progress Software WhatsUp Gold is seeing active exploitation attempts, making it essential that users move quickly to apply the latest. The vulnerability in question is CVE-2024-4885 (CVSS score: 9.8), an unauthenticated remote code execution bug impacting versions of the network monitoring application released before 2023.1.3. "The
Avatar
Read More