Products + All Products + Software Integrity + Semiconductor IP + Verification + Design + Silicon Engineering
Posted by Robert Vamosi on September 20, 2016
While the Tesla Model S has been hacked before, this new attack can be carried out without any physical contact the car and from up to several miles away.
On Monday, researchers from Keen Security Lab, lead by Chris Evans, announced “we have discovered multiple security vulnerabilities and successfully implemented remote, aka none physical contact, control on Tesla Model S in both Parking and Driving Mode. It is worth to note that we used an unmodified car with latest firmware to demonstrate the attack.”
The security team reported the vulnerabilities to Tesla. Owners of current Tesla models are urged to upgrade to the last firmware to guard against this attack.
“As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars.”
In 2015, researchers Kevin Mahaffey and Marc Rogers demonstrated a successful hack of a Tesla Model S at DEF CON 23. However, in order to do so, the duo had to disassemble the car and physically connect. The new attack is remote and has been tested on a variety of Tesla vehicles.