Researchers have found vulnerabilities in the infotainment systems of some Skoda and Volkswagen cars, which could let hackers track users and access sensitive data remotely. PCAutomotive, an automotive cybersecurity firm, revealed 12 security flaws in the latest Skoda Superb III sedan at Black Hat Europe.
Skoda and Volkswagen car vulnerabilities
The vulnerabilities in the MIB3 infotainment unit could allow hackers to inject malware and access vehicle functions without authorization.
The issue affects the 2022 Skoda Superb III and may extend to other Skoda and Volkswagen models with similar systems, potentially impacting over 1.4 million vehicles.
Hackers Can Remotely Track Users
If exploited, these vulnerabilities could let attackers:
- Track GPS location and speed in real time
- Record conversations via the car’s microphone
- Capture infotainment screen images
- Play sounds in the car
- Access the owner’s phone contacts
Danila Parnishchev from PCAutomotive explained that attackers within 10 meters could exploit these flaws via Bluetooth without authentication.
Researchers also found issues in the OBD interface, allowing attackers to bypass UDS authentication. Alarmingly, one flaw could even shut off the engine at high speed, though this requires physical access to the OBD port.
Volkswagen, Skoda’s parent company, has patched the vulnerabilities after they were reported.
Skoda spokesperson Tom Drechsler assured customers there was no risk to safety and said the company is addressing the issues through ongoing improvements.
This incident highlights the need for stronger cybersecurity as vehicles become more connected, emphasizing the importance of robust security measures and regular audits to protect users.
CVE ID | Title | Severity (CVSS 3.1) |
---|---|---|
CVE not assigned | SWD debug interface available on infotainment ECU | Not calculated |
CVE not assigned | Debug console on Power Controller Chip | Not calculated |
CVE-2023-28895 | Hard-coded password for access to power controller chip memory | 3.5 (Low) |
CVE-2023-28896 | Weak encoding for password in UDS services | 3.3 (Low) |
CVE-2023-28897 | Hard-coded password for UDS services | 4.0 (Medium) |
CVE-2023-28898 | Head Unit Denial-of-Service via Apple CarPlay service | 5.3 (Medium) |
CVE-2023-28899 | Denial of Service via ECU reset service | 4.7 (Medium) |
CVE-2023-28900 | Nickname disclosure on the backend automotive server | 5.3 (Medium) |
CVE-2023-28901 | Trip data disclosure on host fal-3a.prd.eu.dp.vwg-connect.com | 5.3 (Medium) |
Follow Us on: Twitter, Instagram, Facebook to get the latest security news!
Leave A Comment