Charging Port Opener Attack
A hacker who goes by the name NotPike on Twitter revealed how they were able to conduct a replay attack on Tesla’s charging ports. This was because the ports use 315 MHz as their standard signal to open ports, which can be replayed to open charging ports.
UN R155 References
- 4.3.2 Threats to vehicles regarding their communication channels
- 4.3.4 Threats to vehicles regarding unintended human actions facilitating a cyber attack
- 4.3.6 Threats to vehicle data/code
- 4.3.7 Potential vulnerabilities that could be exploited if not sufficiently protected or hardened