How Authentication and API Vulnerabilities Undermine Fleet Management Systems
October 10, 2024Weak authentication and API vulnerabilities expose sensitive fleet data to risks. We explore key security measures, including encryption and API protection, to safeguard fleet management and EV systems.
CyberThreat Research LabNow-Patched Kia Vulnerabilities Could Have Allowed Remote Control Using Only a License Plate Number
September 30, 2024A set of vulnerabilities in Kia vehicles could have allowed remote access to critical functions and personal information using only a license plate number, potentially exposing owners to unauthorized control and data theft. Although these vulnerabilities have been fixed, they underscore the need for stronger cybersecurity measures among OEMs.
CyberThreat Research LabFrom Pwn2Own Automotive: A Stack-Based Buffer Overflow Vulnerability in JuiceBox 40 Smart EV Charging Station
September 18, 2024We examine CVE-2024-23938, a JuiceBox 40 smart EV charging station vulnerability discovered at Pwn2Own Automotive, and discuss its broader implications for the automotive industry.
CyberThreat Research LabSecurity Takeaways From Autel MaxiCharger Vulnerabilities Discovered at Pwn2Own Automotive 2024
September 9, 2024VicOne researchers examine two Autel MaxiCharger vulnerabilities discovered at Pwn2Own Automotive 2024 and provide insights into their implications for automotive cybersecurity.
CyberThreat Research LabThe Ripple Effect of Ransomware Attacks on the Automotive Supply Chain
September 6, 2024Ransomware is disrupting the automotive industry, from IT and OT systems to emerging V2X technologies. We discuss the repercussions, key vulnerabilities, and strategies to safeguard against future attacks.
CyberThreat Research LabSecuring the Automotive Supply Chain: Lessons From the Ransomware Attack on a Car Dealership Software Provider
July 4, 2024A software provider for automotive dealerships recently fell victim to a ransomware attack, causing widespread outages and crippling operations for thousands of car dealers. We examine the far-reaching implications of this incident on the automotive supply chain, outline critical lessons learned, and provide strategic security recommendations for automotive stakeholders.
CyberThreat Research LabFrom Key Fob to UWB: Explaining and Securing Ultra-Wideband in Vehicles
June 19, 2024In this second part of our series on vehicle entry system technology, we focus on its most recent iteration, the ultra-wideband (UWB) protocol. We cover its advantages, the potential vulnerabilities it carries, and the measures that will help secure its integration into vehicles.
CyberThreat Research LabFrom Key Fob to UWB: How Hackers Hijack Vehicle Entry Systems
June 7, 2024In this first installment, we examine the history of automotive entry technology and explore notable types of security breaches such as replay attacks, rolling attacks, and relay attacks.
CyberThreat Research LabHow Malicious Apps in Connected Vehicles Could Lead to Heightened Risks
May 28, 2024Apps play a significant role in enhancing the functionality and driving the evolution of software-defined vehicles (SDVs). However, their integration also introduces new risks, as we explore in this blog entry.
CyberThreat Research LabWhy the Rust Programming Language Is Not a Silver Bullet for Automotive Security
May 17, 2024Rust, a memory-safe programming language, is gaining traction as it is designed to address memory-related vulnerabilities. We discuss its potential impact on automotive cybersecurity.
CyberThreat Research LabHarnessing Python and ChatGPT for Automotive Security Research
May 6, 2024A VicOne researcher demonstrates how automotive security researchers can take advantage of Python and ChatGPT, especially in scripting proofs of concept of known attacks and exploring novel vulnerabilities in automotive systems.
CyberThreat Research LabOpen RAN: A Gateway to Improved V2X Communications and to New Security Risks
April 12, 2024Open RAN is said to usher advances in V2X communications for connected vehicles. Researchers have taken a closer look at this technology to see where vulnerabilities might slip through amid its anticipated advantages.
CyberThreat Research Lab