A strange glitch in the SiriusXM code could unlock your smart car

A code flaw that allowed criminals to steal cars online has now been fixed, according to reports, with owners urged to update their systems immediately.

The bug was found in Connected Vehicle Services, a software suite that offers a slew of features such as automatic collision notifications, enhanced roadside assistance, remote door unlocking, remote starting, stolen vehicle recovery assistance, turn-by-turn navigation and smart home integration. hardware.

The connected vehicle services were created by SiriusXM, and are used by a slew of automakers, including Honda, Nissan, Infiniti, and Acura, all of which were vulnerable.

VIN for authorization

The flaw was exposed by Yuga Labs security researcher Sam Curry, who has a history of finding security flaws in cars. in Twitter topic (Opens in a new tab)Carey explained how the glitch works, and added that SiriusXM actually fixed it.

Apparently, the problem arose from the fact that the telematics platform uses the Vehicle Identification Number (VIN), which is often found on the windshield, to authorize commands and take over user profiles.

This means that whoever knows the VIN number can remotely issue a number of commands, from opening the doors to starting the engine.

Respond to the results in logA company spokesperson said SiriusXM received a tip-off via bounty hunt

“We take the security of our customers’ accounts very seriously and participate in a bug bounty program to help identify and patch potential security vulnerabilities affecting our platforms,” ​​the statement read.

As part of this work, a security researcher submitted a report to Sirius XM’s Connected Vehicle Services about a license flaw affecting certain telematics software. The problem was resolved within 24 hours after submitting the report. No subscriber or other data has been hacked and no unauthorized account has been modified using this method.”

Across: log (Opens in a new tab)

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version