- a security researcher has detailed a pair of unintended flaws, known as "exploits," that would allow a person to steal a tesla model x in minutes.
- the researcher carried off the feat with about $300 in computer hardware items, including a tesla part found on ebay, as wired first reported.
- researcher lennert wouters told tesla of the vulnerability back in august, and tesla has told wouters an over-the-air update will be sent out this week to fix the issue.
automakers work hard to reduce the possibility that hackers can steal their cars. but, it's an ongoing battle between the people who make the systems in vehicles and those who want to exploit them. fortunately for tesla, the latest pair of unintended flaws—known to computer types as "exploits"—were found by a security researcher happy to share his findings, not a group of car thieves with a taste for falcon-winged evs.
wired reported about the security researcher, lennert wouters from ku leuven university in belgium. he discovered a pair of vulnerabilities that allow the researcher to not only get into a model x, but also start it and drive away. wouters disclosed the vulnerability to tesla back in august, and the automaker has told wouters that an over-the-air patch may take a month to be deployed to affected vehicles. for wouters's part, the researcher says that he won't publish the code or technical details needed for anyone else to pull off this hack. he did post a video demonstration of the system in action.
to steal a model x in minutes requires the exploitation of two vulnerabilities. wouters started with a hardware kit costing roughly $300 that sits in a backpack and includes a raspberry pi low-cost computer and a model x body control module (bcm) that he purchased off ebay. it's the bcm that enables these exploits, even though it's not from the target vehicle. it acts like a trusted piece of tesla hardware that allows both exploits to be pulled off. with it, wouters is able to hijack the bluetooth radio connection that the key fob uses to open the vehicle using the vin and coming within 15 feet of the target vehicle's fob. at that point, his hardware system rewrites the target's fob firmware and is able to access the secure enclave and get the code to unlock the model x. he stores that code in his backpack rig and returns to the model x, which opens up because it believes it's connected to the original fob.
essentially, wouters is able to create a key for a model x by knowing the last five digits of the vin—which is visible in the windshield—and standing near the owner of that vehicle for about 90 seconds while his portable setup clones the key.
once in the vehicle, wouters has to use another exploit to get the vehicle started. by accessing the usb port hidden behind a panel under the display, wouters is able to connect his backpack computer to the vehicle's can (controller area network) bus and tell the vehicle's computer that his spoofed key fob is valid. with that done, the model x believes a valid key is in the vehicle and willingly starts up and is ready to drive away.
the issue is that the key fob and bcm, while connecting to each other, don't go the extra step of validating firmware updates to the key fob, giving the researcher access to the key by pretending to send over new firmware from tesla. "the system has everything it needs to be secure," wouters told wired. "and then there are a few small mistakes that allow me to circumvent all of the security measures."
wouters also noted that this type of exploit isn't unique to tesla. "they're cool cars, so they're interesting to work on," wouters told wired. "but i think if i spent as much time looking at other brands, i would probably find similar issues."
tesla has a history of working with security researchers and even offers up a model 3 every year to the pwn2own competition. wouters won’t share the technical details of his exploit until january at the real world crypto conference.