

Specifically for Rolling-PWN, GitHub stated, “the recommended mitigation strategy is to upgrade the vulnerable BCM firmware through Over-the-Air (OTA) Updates if feasible.” Currently, Honda is not conducting a recall on their cars or key fobs to remediate the vulnerability.īeyond that, smart cars need to be addressed just as any other connected computer system. While a CISO can’t change the type of encryption used on a key fob, they can take steps to protect the vehicles from cyberattacks. Keeping Vehicles SafeĬompany-owned vehicles aren’t usually under the oversight of CIOs and CISOs, but as more smart vehicles enter the corporate fleet, the cyber risks need to be addressed. But as Alan Grau explained in an Electronic Design article, “it can easily use 100X more CPU cycles than symmetric encryption.” It’s too much for systems to handle in a timely manner, so manufacturers default to symmetric encryption and take the risk of the codes being intercepted.
#Xforce keymaker code#
The problem with symmetric encryption is that it can be easily intercepted.Īsymmetric encryption, which uses both a public and a private key, is a much more secure method of code transmission. Many fobs are connected with a smartphone app.Īlthough the fobs are encrypted, they tend to use symmetric encryption or a single key used by both the device sending the message and the device receiving it. Depending on the brand and model of the vehicle, the fob offers controls for almost everything – opening windows, remotely starting the engine and defrosting the windshield, just for starters. Key fobs have evolved over the past two decades beyond when their primary purpose was to unlock doors. Today, Rolling-PWN appears to only target Honda vehicles, but, like any type of cyberattack, expect any system that uses this type of rolling code technology to be at risk. Whoever has access to these codes has permanent access to unlock the car doors and possibly start the vehicle. Therefore, those commands can be used later to unlock the car at will,” according to GitHub.Įven though this vulnerability became news over the summer of 2022, the vulnerability was found in 2012 Honda cars and should be assumed to affect every Honda on the market today. Once counter resynced, commands from the previous cycle of the counter worked again. “By sending the commands in a consecutive sequence to the Honda vehicles, it will be resynchronizing the counter. Honda vehicles don’t need the exact codes - instead, the rolling codes fall into a window of codes. Whenever the fob button is pressed, there is an increase in rolling codes that are synchronizing. The attack exploits a vulnerability in authentication code transmitted wirelessly between the fob and the vehicle. Rolling codes are used to avoid replay attacks, which are man-in-the-middle attacks that are intercepted and re-transmitted as if they are authentic codes. The key fob attack impacting Honda vehicles is known as the Rolling-PWN. While Tesla vulnerabilities may get high-profile attention, key fob vulnerabilities are found in vehicles more commonly found in public parking lots, in neighborhood driveways and as part of corporate vehicle fleets. Meanwhile, a European researcher discovered Tesla’s near field communication (NFC) card that’s used like a key fob can easily be exploited by hackers, all because Tesla provides a 130-second window between unlocking the car and starting the engine. For example, a teenager found a vulnerability in an app that controls some basic functions like unlocking the vehicles or flashing the headlights.

Tesla cars have made news recently due to several different key-fob-related exploits. But the most popular attack vector, at least for now, is the wireless key fob. Threat actors have the opportunity to do almost anything, from stealing personal data to manipulating any of the different systems and sensors in the vehicle. The same risks found in any connected device are found in a smart car.

Most IoT or smart devices were never designed with cybersecurity in mind, but vehicles take that lack of security to a higher level, with piecemeal technologies developed by third-party companies. One of the most recently announced attack vectors is the key fob for recent model Honda vehicles. I know that as cars get smarter, they become more susceptible to hackers who are searching for any potential vulnerability. So when I sat in my new car for the first time and saw all the different ways it linked to my phone or my home WiFi, more than a few red flags went up. As a cybersecurity writer, I’m more aware than the average person of the security risks with any connected device.
