Skip to main content

BMW racing to patch 14 security vulnerabilities found in its cars

2019 BMW X4 (European version)
Image used with permission by copyright holder

Chinese researchers discovered 14 vulnerabilities on the on-board computers of a number of BMW vehicles, leading the automaker to begin issuing security patches over-the-air and through dealer networks. These flaws affect the infotainment unit, telematics controls, and the wireless communications systems on BMW’s i Series, X1 sDrive, 5 Series, and 7 Series models dating as far back as 2012. Four of the discovered vulnerabilities require hackers to have physical USB access to the car, while six of the vulnerabilities can be exploited remotely. The last four vulnerabilities require physical access to the car’s computer.

Recommended Videos

“Our research findings have proved that it is feasible to gain local and remote access to infotainment, T-Box components, and UDS communication above certain speed [for] selected BMW vehicle modules and been able to gain control of the CAN buses with the execution of arbitrary, unauthorized diagnostic requests of BMW in-car systems remotely,” the researchers at at Tencent’s Keen Security Lab wrote in a preliminary report, noting that a full report would be available sometime in 2019 to allow BMW time to patch the flaws.

Additionally, if a hacker has access to the vehicle physically, the USB, Ethernet, and OBD-II ports could also be exploited. Because the USB Ethernet Interface doesn’t have security restrictions, it could be used to access the internet network of the head unit and detect the exposed internal services through port scanning, the report said. Hackers can also use a USB stick to inject malicious code into BMW’s ConnectedDrive by gaining root control of the hu-intel system.

Hackers can also trigger remote code execution if they don’t have access to a vehicle by exploiting memory corruption vulnerabilities that allowed users to bypass signature protection in the firmware and break secure isolation of various system components. (In 2015, a 14-year-old hacked a car with $15 worth of tech using a similar technique.) By gaining access to CAN buses, an attacker can remotely trigger remote diagnostic functions by leveraging a chain of multiple vulnerabilities across several affected vehicle components. Hackers can send arbitrary diagnostics to the engine computer. The danger, according to researchers, is that the engine control unit, or ECU, will still respond to diagnostic messages even at normal driving speeds, and “it will become much worse if attackers invoke some special UDS routines.”

“By chaining the vulnerabilities together, we are able to remotely compromise the NBT [car computer],” researchers said. “After that, we can also leverage some special remote diagnose interfaces implemented in the Central Gateway Module to send arbitrary diagnostic messages (UDS) to control ECUs on different CAN Buses.”

In a statement to ZDNet, the BMW Group noted that the research was conducted in conjunction with BMW’s cybersecurity team, highlighting that “third parties increasingly play a crucial role in improving automotive security as they conduct their own in-depth tests of products and services.”

Chuong Nguyen
Silicon Valley-based technology reporter and Giants baseball fan who splits his time between Northern California and Southern…
BMW shows off an electric car with color-changing paint at CES 2022
A color-changing BMW iX electric SUV.

From engine sounds to seat massagers, modern cars let drivers personalize almost everything. At CES 2022, BMW is taking that idea a step further with a concept version of its iX electric SUV that sports color-changing paint.

The effect relies on E Ink, the same electronic paper technology used in e-readers. Millions of microcapsules approximately the diameter of a human hair are embedded in an exterior wrap made from laser-cut electronic paper segments, according to BMW. They contain negatively charged white pigments and positively charged black pigments. Activating an electric field causes different amounts of each pigment to collect on the surface, shifting the color between black, white, and gray with the press of a button.

Read more
The Arlo Security System brings all-in-one functionality thanks to its multisensor
The Arlo Security System features an NFC reader.

If CES 2022 is a boxing ring, Arlo has thrown one of the first punches with the announcement of the Arlo Security System, an all-in-one DIY solution to home security. It's not only a 2022 CES Innovation Award honoree, but it also features an all-in-one multisensor capable of eight different sensing functions that include motion, when a door or window opens or is tilted, water leaks, light and temperature changes, and the alarm patterns of T3 and T4 smoke and carbon monoxide detectors.

Perhaps the most impressive part is the size of the sensor. At just 1.1-inches wide, the multisensor is discrete and fits anywhere in the home without hardwiring. A more flexible sensor (with more flexible placement options) means better security overall.

Read more
How Apple’s tight ecosystem of products can undermine its own security
Person accessing a state ID using their Apple Watch.

There’s an old belief that you can’t have both security and convenience, and that’s seen as especially true in your digital life. I’m sure Apple would dispute that assertion, pointing to things like Face ID as evidence it can do both.

Yet, as we've seen in recent months, there are actually times when Apple’s ecosystem, so tightly linked across its platforms, can actually undermine its own security. If your dwelling only has one locked door, it only takes one key to have access to the whole house.
Face ID, the iPhone, and the Apple Watch

Read more