WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.1K

So, I guess they just gave up on trying to keep systems separated after a Defcon talk like 15 years ago showing a hack to a jeep that took a lot more specific situations and direct access to a USB port. In this case, you just need to fuck with some bluetooth and wifi and you get full control.

This is going to be very bad for the future.

Archive: https://archive.today/DsyLv

From the post:

>As cars increasingly become computers on wheels, the attack surface for digital malfeasance increases. [PCAutomotive] has shared its exploit for turning the 2020 Nissan Leaf into 1600 kg RC car. [PDF via Electrek] Starting with some scavenged infotainment systems and wiring harnesses, the group built test benches able to tear into vulnerabilities in the system. An exploit was found in the infotainment system’s Bluetooth implementation, and they used this to gain access to the rest of the system. By jamming the 2.4 GHz spectrum, the attacker can nudge the driver to open the Bluetooth connection menu on the vehicle to see why their phone isn’t connecting. If this menu is open, pairing can be completed without further user interaction.

So, I guess they just gave up on trying to keep systems separated after a Defcon talk like 15 years ago showing a hack to a jeep that took a lot more specific situations and direct access to a USB port. In this case, you just need to fuck with some bluetooth and wifi and you get full control. This is going to be very bad for the future. Archive: https://archive.today/DsyLv From the post: >>As cars increasingly become computers on wheels, the attack surface for digital malfeasance increases. [PCAutomotive] has shared its exploit for turning the 2020 Nissan Leaf into 1600 kg RC car. [PDF via Electrek] Starting with some scavenged infotainment systems and wiring harnesses, the group built test benches able to tear into vulnerabilities in the system. An exploit was found in the infotainment system’s Bluetooth implementation, and they used this to gain access to the rest of the system. By jamming the 2.4 GHz spectrum, the attacker can nudge the driver to open the Bluetooth connection menu on the vehicle to see why their phone isn’t connecting. If this menu is open, pairing can be completed without further user interaction.

(post is archived)