MENU

Argus Cyber Security and Bosch work to mitigate car hacking

Argus Cyber Security and Bosch work to mitigate car hacking

Business news |
By Jean-Pierre Joosting



The Argus research group succeeded in remotely taking over safety-critical vehicle systems via a Bosch Drivelog Connector dongle installed in the vehicle. A vulnerability found in the authentication process between the dongle and the Drivelog Connect smartphone application enabled Argus researchers to uncover the security code within minutes and communicate with the dongle from a standard Bluetooth device, such as a smartphone or laptop. After gaining access to the communications channel, Argus researchers were able to duplicate the message command structure and inject malicious messages into the in-vehicle network. Effectively bypassing the secure message filter that was designed to allow only specific messages, these vulnerabilities enabled the Argus research group to take control of a moving car, demonstrated through remotely stopping the engine.

“At our core, Argus is dedicated to ensuring that vehicles are cyber-safe and our ongoing collaboration with global Tier 1 suppliers and car manufacturers enables us to provide the most advanced cyber security solutions for the automotive industry,” said Yaron Galula, Argus CTO and Co-Founder. “The Bosch discovery demonstrates that solutions based on cryptography, even when designed by leaders in the industry, are not foolproof and that multi-layered defenses are required to effectively protect vehicles from cyber threats.”

As soon as Argus found cyber security vulnerabilities in the Bosch Drivelog Connector dongle, Bosch was duly informed. The level of attention the matter received from Bosch top management was significant and their Product Security Incident Response Team worked quickly to immediately address the issues across their security and development divisions.

Bosch expressed its gratitude to the Argus team for the responsible disclosure of these vulnerabilities and their help throughout the process.

“Bosch takes security very seriously. When Argus informed us about the security gaps, we took immediate action to verify and fix the issues,” said Thorsten Kuhles, head of the Bosch Product Security Incident Response Team (PSIRT).


Only a short time after being notified Bosch has already implemented an initial fix. It is important to note that scalability of a potential malicious attack is limited by the fact that such an attack requires physical proximity to the dongle. This means that the attacking device needs to be within Bluetooth range of the vehicle. Furthermore, an initial attack requires brute forcing the PIN for a given dongle and sending a malicious CAN message that fits the constraints of the dongle and the vehicle.

“To further increase security a patch that fixes the underlying weaknesses in the encryption protocol will be available shortly. This patch will prevent the kind of attack as described by Argus,” Kuhles adds.

Additional work is also being done to further limit the possibility to send unwanted CAN messages and will be rolled out alongside further improvements later in the year.

A full technical account of the attack is posted on Argus’ blog.

www.argus-sec.com
www.bosch.com

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News

Share:

Linked Articles
10s