Podcast
Root Causes 271: A Whole Fleet of Identity-based Automotive Hacks


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 23, 2023
A white hat security researcher recently revealed a large number of identity-based vulnerabilities across many automotive manufacturers. In this episode we explain how a group of white hats exploited these manufacturers' dependence on non-secret "secrets" such as VIN or email address to force a raft of unacceptable behaviors across a large number of automotive brands.
Podcast Transcript
Lightly edited for flow and brevity.
Basically, identities of a car. Let’s think about identity for a moment. Most car manufacturers when they are making the choice of, hey, there’s some sort of personalization going on with the vehicle. You are choosing to have your car seat position digitally remembered in a vehicle. You are making choices, you know, fleet management, etc. When car manufacturers are deciding how do we store a certain set of personalization against a vehicle, well, there’s that VIN number. It’s unique to each car. The problem is that it’s not a secret.
That’s most of what we talk about and unfortunately, what we are finding in the car industry is that because they don’t listen to this podcast enough apparently, they are choosing secrets for digital identity that are not secret. And so therefore, what you’d think is ok that VIN number, whatever, it’s publicly known information. You can walk up to a car and read the VIN.
Most of the time. And so therefore, it’s just like something we’ve argued before where your fingerprint, your eyes, your voice – our voices aren’t a secret. We are giving them to you right now. The whole point about a weak secret is if you are going to use weak secrets to do unique identification, you should be associating that with a strong secret in order to be able to do things such as attest yourself into a cloud webserver. If you are storing sensitive information, PII, the ability to turn off a starter on a car, the ability to do - -
Unfortunately, what we are seeing in Sam Curry’s research is that this combination of weak authentication at the point of APIs and weak authentication or non-existent authentication in many cases leads to these kinds of white hat research reports that just seem absurdly crazy.
So think about, Tim, one of the devastating results of genetic singleness for lack of a better way of putting it in things like a wheat crop. You get a virus. You get a bug of some kind that has genetically figured out how to optimize it’s way into a particular crop of wheat where they are genetic clones of each other. You can wipe out the entire wheat crop in a moment. Like that’s the problem. And so the way that Mother Nature solved that way before we ever started to do genetic modification was every wheat stalk was just a tiny bit different and so you’d only lose part of the wheat. You’d never lose everything. The way cars are made you don’t think of the brand names as being clones of each other but the digital aspect of automobiles is a monoculture and so that’s why white hat researchers and, unfortunately, the bad guys as well, they know this. So they don’t have to work very hard to – hack one, you’ve hacked them all. Or hack many. And I think that is part of the lesson of what is being taught here. It’s not just that we are using weak credentials with weak authentication schemes but also what’s making this super - -
So therefore, why haven’t we seen more bad guys attack X, Y and Z? I think it’s because there is a certain discipline aspect. You know, why hurt people when you can do fraud. You know, nation states, they pick their moment when they want to go to war. They don’t just cause mayhem all the time.
Think about this for a moment. Think about not just these white hats that are fantastically calling this all to our attention but what’s the motivation for a bad guy to - - there’s really nothing stopping bad guys from causing absolute mayhem.
Mobile devices are – well, they are far from perfect but if they were as bad as automobiles appear to be, my God the heartburn that consumers would have just on privacy issues. Never mind public safety issues but with an automobile, we’ve talked a few times on this podcast about automobiles becoming kind of the new mobile devices. They are so computerized, so connected and I think when we start to have autonomous vehicles in the future that will become even that much more so.
Charlie Miller brought it to our attention X number of years ago and it was even understood before that that there were problems. But now we are talking about very, very computerized automobile systems and we are talking about a compounded problem. Not just a privacy or the risk of fraud, but we are now talking about personal and public safety. It’s all of these things and I think we should be thinking about these things at the critical infrastructural level, Tim.
So therefore we are talking about culture. You know what? We know technologically how to solve a lot of these problems. PKI industry has been solving problems of strong personal identities, the ability to personalize mobile devices and computers, secure communication to APIs, all these things that has been pointed out in the blog post that we are referring to today and the car industry is also aware of that as well. The argument that I have heard, Tim, and I will end it with this – the argument that I’ve heard is, oh, we are very cost sensitive. One penny more on the price of a vehicle is too much for the market to bear. You know, when is that gonna end? It’s not just because I work in the security industry but I’d pay more than a penny to know that I was in a vehicle that some bad guy couldn’t just run me off the road.

