Menu
Updates are coming for a telematics unit that hacked a Corvette

Updates are coming for a telematics unit that hacked a Corvette

Mobile Devices Ingenierie says an update will require that security rules are applied to deployed dongles

This is the C4E family telematics control unit from the French company Mobile Devices used by researchers to turn on the windshield wipers and apply the brakes of a Corvette remotely.

This is the C4E family telematics control unit from the French company Mobile Devices used by researchers to turn on the windshield wipers and apply the brakes of a Corvette remotely.

Security updates are being distributed for a telematics control unit (TCU) that security researchers showed could be manipulated to remotely apply the brakes of a Corvette, according to the device's French manufacturer.

The device is a small dongle that plugs into the On-Board Diagnostics II (OBD-II) port on a vehicle, usually located under the driver's side dashboard. TCUs with cellular connections are increasingly being used in vehicles by insurance companies to monitor drivers or for fleet management.

At the USENIX security conference this week in Washington, D.C., academics from the University of California demonstrated how a C4E family dongle from Paris-based Mobile Devices Ingenierie could be remotely accessed.

TCU's collect data from a vehicle and have access to its CAN bus, which interfaces with a variety of sensors. The academics showed they could send a remote command by text message to the TCU and access the CAN bus.

For example, they turned on the Corvette's windshield wipers and applied its brakes while the car was traveling at a low speed, according to a video.

Aaron Solomon, CEO at Mobile Devices, said via email Wednesday that his company is identifying vulnerable deployed devices and is aiming to secure them with a new security pack within 10 days.

"We are currently identifying -- together with our customers -- all the deployments that were made without activating all the security mechanisms and making sure the security pack gets applied to all vehicles that are concerned," he wrote.

Part of the issue with Mobile Devices' TCUs lies in how the devices are distributed. Solomon wrote his company's TCUs are sold to integrators in a state that allows those companies to have maximum flexibility to develop their own applications.

The TCUs have a production mode, which if activated, provides stronger security, Solomon wrote. But it's up to integrators to decide when and how to activate that mode.

Mobile Devices is also changing its approach to how it handles security on its end. It has come up with a new set of rules that will automatically activate the security package when devices are deployed.

"The purpose of these rules is that there can't be any deployment without all the security features activated," he wrote.

The Corvette used by the researchers didn't have any vulnerabilities itself, and the attack just focused on the Mobile Devices' TCU. But car manufacturers also install their own cellular-connected telematics units, which have also been proved vulnerable.

At the Black Hat security conference last week, researchers Charlie Miller and Chris Valasek showed how a Jeep Cherokee's brakes could be applied by exploiting security weaknesses in UConnect, a telematics unit used for entertainment, navigation and other controls. Fiat Chrysler recalled 1.4 million vehicles as a result of the findings.

The flurry of car-hacking research has also prompted U.S. lawmakers to call for legislation that ensures vehicles are better protected from attacks.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Mobile Devices Ingenierie

Events

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments