The researchers will present their research next week at the Black Hat cybersecurity conference in Las Vegas.

Christian Werling, one of the three students at Technische Universität Berlin who conducted the research along with another independent researcher, said that their attack requires physical access to the car, but that’s exactly the scenario where their jailbreak would be useful.

“We are not the evil outsider, but we’re actually the insider, we own the car,” Werling told TechCrunch in an interview ahead of the conference. “And we don’t want to pay these $300 for the rear heated seats.”

The technique they used to jailbreak the Tesla is called voltage glitching. Werling explained that what they did was “fiddle around” with the supply voltage of the AMD processor that runs the infotainment system.

“If we do it at the right moment, we can trick the CPU into doing something else. It has a hiccup, skips an instruction and accepts our manipulated code. That’s basically what we do in a nutshell,” he said.

With the same technique, the researchers said they were also able to extract the encryption key used to authenticate the car to Tesla’s network. In theory, this would open the door for a series of other attacks, but the researchers said they still have to explore the possibilities in this scenario.

The researchers said they were also able to extract personal information from the car such as contacts, recent calendar appointments, call logs, locations the car visited, Wi-Fi passwords and session tokens from email accounts, among others. This is data that could be attractive to people who don’t own that particular car, but still have physical access to it.

Mitigating the hardware-based attack that the researchers achieved is not simple. In fact, the researchers said, Tesla would have to replace the hardware in question.

Tesla did not respond to a request for comment.

  • Chriskmee@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    edit-2
    1 year ago

    If I remember correctly, rear heated seats were only extra (and pre-installed just needing a software update to enable) once. There was a time when the cheapest model 3 was slightly too expensive for some rebates, so they sold a software locked version that was just barely was under the limit for the rebate. To reduce the initial price they software locked the rear heated seats, along with some battery capacity, and maybe one or two other things, all of which you could pay to unlock afterwards.

    • belshamharoth@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Why didn’t they simply make the car cheaper without software locking features?

      Seems like a bit of a lousy move on the part of Tesla

      • Chriskmee@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        They probably didn’t make much on the software locked car, so they are banking on people that buy it to pay for the upgrades. They also didn’t want to invest in a new assembly like just to produce this limited run vehicle