-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcamp2023-57024-eng-Horror_Stories_from_the_Automotive_Industry_opus.srt
2452 lines (1839 loc) · 57.7 KB
/
camp2023-57024-eng-Horror_Stories_from_the_Automotive_Industry_opus.srt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1
00:00:00,000 --> 00:00:10,000
[MUSIC]
2
00:00:10,000 --> 00:00:20,000
[MUSIC]
3
00:00:20,000 --> 00:00:33,200
And we will have a five minute Q&A in the end of the talk.
4
00:00:33,200 --> 00:00:39,760
And the talk is about nightmares in the automotive security.
5
00:00:39,760 --> 00:00:46,720
And we have Thomas Sampini here, who is a pen tester with automotive.
6
00:00:46,720 --> 00:00:50,160
And he will talk about the nightmares.
7
00:00:50,160 --> 00:00:52,420
Welcome.
8
00:00:52,420 --> 00:01:00,100
>> [APPLAUSE]
9
00:01:00,100 --> 00:01:01,360
>> Thank you.
10
00:01:01,360 --> 00:01:04,920
So hello everyone, I hope you're not drunk or sleepy.
11
00:01:04,920 --> 00:01:08,080
I'm sleepy, but we will go through it.
12
00:01:08,080 --> 00:01:11,480
So today we will talk about horror stories in the automotive industry.
13
00:01:11,480 --> 00:01:15,320
I'm Thomas Sampinis, otherwise you might know me as Crow Tom.
14
00:01:15,320 --> 00:01:17,600
This is the CCC edition.
15
00:01:17,600 --> 00:01:20,880
It's been already once presented.
16
00:01:20,880 --> 00:01:25,600
I'm Thomas Sampinis, as I said, I'm automotive pen tester lead by day.
17
00:01:25,600 --> 00:01:29,320
In auxiliary cybersecurity and thanks a lot to this team for
18
00:01:29,320 --> 00:01:31,520
the support and the help for this research.
19
00:01:31,520 --> 00:01:34,160
And the security researcher by night.
20
00:01:34,160 --> 00:01:36,080
I like to hack everything everywhere.
21
00:01:36,080 --> 00:01:37,000
I don't really care.
22
00:01:37,000 --> 00:01:40,640
I just like to hack everything that gets into my hands and
23
00:01:40,640 --> 00:01:42,560
I really love security conferences.
24
00:01:42,560 --> 00:01:44,200
For more, you can go to my website.
25
00:01:44,200 --> 00:01:48,200
There are some specific goals for this talk.
26
00:01:48,200 --> 00:01:51,600
First of all, I want to analyze the state of cybersecurity in
27
00:01:51,600 --> 00:01:53,160
the automotive industry.
28
00:01:53,160 --> 00:01:56,000
I want to present some unique and hopefully interesting for
29
00:01:56,000 --> 00:01:59,040
you use cases, result of around 100 pen tests and
30
00:01:59,040 --> 00:02:02,000
research projects in this industry.
31
00:02:02,000 --> 00:02:05,680
Endorse and push more hackers to the automotive industry and
32
00:02:05,680 --> 00:02:11,000
educate the new, the old and the bold of this industry.
33
00:02:11,000 --> 00:02:12,280
And of course raise and
34
00:02:12,280 --> 00:02:15,920
highlight the significance of security related devices.
35
00:02:15,920 --> 00:02:21,320
Let's start with an overview of the state of cybersecurity in
36
00:02:21,320 --> 00:02:24,520
the automotive industry and discuss where we currently are,
37
00:02:24,520 --> 00:02:27,280
what is planned and where we're currently heading.
38
00:02:27,280 --> 00:02:31,200
And there are several incidents throughout the years, but
39
00:02:31,200 --> 00:02:35,200
I still get fascinated by the quality of the findings that
40
00:02:35,200 --> 00:02:40,720
get discovered on the automotive industry into 2023 still.
41
00:02:40,720 --> 00:02:44,720
Some examples from the last years are some fixed code
42
00:02:44,720 --> 00:02:47,800
vulnerabilities in Nissan, for example, which is one of many
43
00:02:47,800 --> 00:02:50,480
examples of this vulnerability in the wild.
44
00:02:50,480 --> 00:02:53,760
Stealing keys with just USB cables, I mean, okay.
45
00:02:53,760 --> 00:02:56,960
Key for vulnerabilities again and again.
46
00:02:56,960 --> 00:03:01,320
Remote unlocks of whole vehicle fleets due to flaws in
47
00:03:01,320 --> 00:03:06,200
series XM, unlocking and stealing vehicles due to easily
48
00:03:06,200 --> 00:03:09,840
accessible campuses and really bad internal architecture,
49
00:03:09,840 --> 00:03:12,560
something that we will also talk in this, speak about in
50
00:03:12,560 --> 00:03:14,000
this talk.
51
00:03:14,000 --> 00:03:17,960
And that's only a sample out of a huge list of similar
52
00:03:17,960 --> 00:03:19,040
incidents in this sector.
53
00:03:19,040 --> 00:03:23,280
I don't know if there is a light in the end of the tunnel, but
54
00:03:23,280 --> 00:03:26,760
the automotive industry cannot be considered new.
55
00:03:26,760 --> 00:03:30,440
The connectivity and technological aspect of it,
56
00:03:30,440 --> 00:03:32,920
though, is not so old.
57
00:03:32,920 --> 00:03:37,560
Entertainment and constant need for connectivity are the main
58
00:03:37,560 --> 00:03:40,840
reasons for the technological advancements and integration
59
00:03:40,840 --> 00:03:42,640
in this industry.
60
00:03:42,640 --> 00:03:47,480
And usually we're talking about 100 plus year old industries
61
00:03:47,480 --> 00:03:50,400
trying to catch up with some young startups.
62
00:03:50,400 --> 00:03:53,400
And this is an example for you to understand what is the
63
00:03:53,400 --> 00:03:55,000
current state of cybersecurity.
64
00:03:55,000 --> 00:03:57,160
This is the BMW i7.
65
00:03:57,160 --> 00:03:59,880
And outside of the common things that you usually see in
66
00:03:59,880 --> 00:04:02,400
a vehicle, you see my whole living room.
67
00:04:02,400 --> 00:04:05,240
Basically, all these things are interconnected.
68
00:04:05,240 --> 00:04:08,120
All these services are connected to the internet and
69
00:04:08,120 --> 00:04:12,080
exposed to some interfaces that are approachable by
70
00:04:12,080 --> 00:04:15,240
attackers eventually.
71
00:04:15,240 --> 00:04:19,160
In order to fight this, there are some regulations that get
72
00:04:19,160 --> 00:04:19,840
introduced.
73
00:04:19,840 --> 00:04:20,960
I don't want to bore you.
74
00:04:20,960 --> 00:04:21,680
It's really late.
75
00:04:21,680 --> 00:04:23,640
I don't want you to sleep.
76
00:04:23,640 --> 00:04:26,560
Basically, to go through it really fast, it provides a set
77
00:04:26,560 --> 00:04:29,760
of standards that must be met in order to ensure the
78
00:04:29,760 --> 00:04:32,280
safety of road vehicles.
79
00:04:32,280 --> 00:04:34,960
It requires operation of certified cybersecurity
80
00:04:34,960 --> 00:04:36,640
management systems.
81
00:04:36,640 --> 00:04:41,320
And in any case, in summary, it tries to shape the completely
82
00:04:41,320 --> 00:04:45,000
unregulated mess that exists until now.
83
00:04:45,000 --> 00:04:49,160
And the big caveat is that penetration testing is solely
84
00:04:49,160 --> 00:04:52,320
based on the risk assessment of the target vehicle or the
85
00:04:52,320 --> 00:04:55,120
target ECU.
86
00:04:55,120 --> 00:04:58,440
Going into the first part, I want to have a discussion
87
00:04:58,440 --> 00:05:01,360
about the tier one suppliers, which of course play a huge
88
00:05:01,360 --> 00:05:04,960
role in the automotive industry, with cars being
89
00:05:04,960 --> 00:05:09,280
literally like LEGOs, pieces of LEGOs that you construct from
90
00:05:09,280 --> 00:05:11,880
different tier one suppliers in order to build the whole
91
00:05:11,880 --> 00:05:13,840
vehicle.
92
00:05:13,840 --> 00:05:17,160
To start talking about it, we need to talk about
93
00:05:17,160 --> 00:05:20,120
cybersecurity requirements, which are developed and
94
00:05:20,120 --> 00:05:21,720
distributed by OEMs.
95
00:05:21,720 --> 00:05:25,800
And it's usually the engineering requirements for
96
00:05:25,800 --> 00:05:27,920
cybersecurity risk management.
97
00:05:27,920 --> 00:05:32,240
And the tier one suppliers should ideally comply to those
98
00:05:32,240 --> 00:05:34,640
for correct and secure functionality of the supplied
99
00:05:34,640 --> 00:05:37,160
components.
100
00:05:37,160 --> 00:05:39,240
If those requirements are followed, though, it's a
101
00:05:39,240 --> 00:05:40,200
different discussion.
102
00:05:40,200 --> 00:05:43,680
So let's go through some real life examples that lead to
103
00:05:43,680 --> 00:05:46,960
complete compromise of a vehicle in the most dumb way
104
00:05:46,960 --> 00:05:48,240
possible.
105
00:05:48,240 --> 00:05:52,200
And the reason for this, from my perspective, is that
106
00:05:52,200 --> 00:05:55,440
several tier ones are based in countries with low
107
00:05:55,440 --> 00:05:57,760
transparency and weak governance.
108
00:05:57,760 --> 00:06:00,120
If you know what I mean.
109
00:06:00,120 --> 00:06:05,360
And secondly, we don't know how clear are these cybersecurity
110
00:06:05,360 --> 00:06:08,720
requirements in order to be followed by these tier one
111
00:06:08,720 --> 00:06:10,000
suppliers.
112
00:06:10,000 --> 00:06:16,240
And then if not only the OEM, but also the appendices
113
00:06:16,240 --> 00:06:20,040
suppliers usually have a reactive approach to security
114
00:06:20,040 --> 00:06:23,600
testing, which assumes that everything described on those
115
00:06:23,600 --> 00:06:27,040
requirements is followed, which leads to shaping weak
116
00:06:27,040 --> 00:06:30,520
penetration testing methodology and test cases
117
00:06:30,520 --> 00:06:33,400
with high probability of losing important parts of
118
00:06:33,400 --> 00:06:36,480
the attack surface.
119
00:06:36,480 --> 00:06:40,080
To start with our first use case and the path to Game
120
00:06:40,080 --> 00:06:43,960
Over, we need to understand a bit what is UDS.
121
00:06:43,960 --> 00:06:48,080
Basically, it's one of the application layer protocols
122
00:06:48,080 --> 00:06:51,880
that run on these electronic control units, the computers
123
00:06:51,880 --> 00:06:56,400
inside the vehicle, for communication between them in
124
00:06:56,400 --> 00:06:58,720
automotive electronics.
125
00:06:58,720 --> 00:07:02,560
It allows diagnostic functionality, such as reading
126
00:07:02,560 --> 00:07:05,840
and erasing fault codes, programming and reprogramming
127
00:07:05,840 --> 00:07:09,000
ECUs, testing and monitoring of them.
128
00:07:09,000 --> 00:07:12,360
It consists of several services, which can be used to
129
00:07:12,360 --> 00:07:14,160
perform specific actions.
130
00:07:14,160 --> 00:07:18,520
And the really common authentication schema in UDS is
131
00:07:18,520 --> 00:07:23,280
the Security Access Service, or 0x27, which allows elevated
132
00:07:23,280 --> 00:07:27,880
access to authenticated users.
133
00:07:27,880 --> 00:07:30,880
And talking about this service, we need to understand
134
00:07:30,880 --> 00:07:36,720
how it works in order to go on how we eventually bypass it.
135
00:07:36,720 --> 00:07:42,640
And basically, there is a client, which is us as a
136
00:07:42,640 --> 00:07:47,040
tester or some reprogramming tool, and the ECU.
137
00:07:47,040 --> 00:07:49,920
The client that wants to be authenticated into the ECU
138
00:07:49,920 --> 00:07:53,160
sends a seed request to the ECU.
139
00:07:53,160 --> 00:07:56,840
The ECU generates a random seed and calculates the key by
140
00:07:56,840 --> 00:08:03,800
using an algorithm for this calculation and the secret key.
141
00:08:03,800 --> 00:08:07,240
It sends the random seed to the client, and the client,
142
00:08:07,240 --> 00:08:10,720
using the same algorithm, the same secret key, has to
143
00:08:10,720 --> 00:08:15,320
calculate the calculated key where the ECU verifies it and
144
00:08:15,320 --> 00:08:18,320
grants access to the client if they are matching from both
145
00:08:18,320 --> 00:08:21,560
calculations on each side.
146
00:08:21,560 --> 00:08:25,360
Regarding this service and considering the trend of
147
00:08:25,360 --> 00:08:27,560
loosely developed requirements, we have observed
148
00:08:27,560 --> 00:08:32,040
several types of outcomes, including sloppy authentication
149
00:08:32,040 --> 00:08:36,000
implementations, weak sources of randomness, something that
150
00:08:36,000 --> 00:08:40,320
I talked last year in Troopers conference, and my talk UDS
151
00:08:40,320 --> 00:08:43,160
fuzzing in the path to Game Over, and backdoors
152
00:08:43,160 --> 00:08:46,520
implemented outside of the scope of the cyber security
153
00:08:46,520 --> 00:08:48,080
requirements.
154
00:08:48,080 --> 00:08:52,560
As an example, we have an extra security access sub-service
155
00:08:52,560 --> 00:08:57,720
which is with extremely weak security for some reason.
156
00:08:57,720 --> 00:08:59,520
And actually, that's the case here.
157
00:08:59,520 --> 00:09:02,200
Here we have a real life example on the
158
00:09:02,200 --> 00:09:03,480
screenshot on the right.
159
00:09:03,480 --> 00:09:06,560
And the same process as we saw previously.
160
00:09:06,560 --> 00:09:10,200
So we send a seed request to the ECU.
161
00:09:10,200 --> 00:09:10,880
We are the client.
162
00:09:10,880 --> 00:09:13,880
We send the seed request to the ECU.
163
00:09:13,880 --> 00:09:19,600
We receive a random seed despite being four bytes.
164
00:09:19,600 --> 00:09:22,320
It's debatable on if we can crack it and how long.
165
00:09:22,320 --> 00:09:24,560
If there is a proper implementation, there should
166
00:09:24,560 --> 00:09:28,520
be a new randomly generated seed every time.
167
00:09:28,520 --> 00:09:31,400
In this case, this seed is always the same.
168
00:09:31,400 --> 00:09:34,040
Every time we request it, we have the same seed.
169
00:09:34,040 --> 00:09:39,480
And by testing the first key that we send, which is only
170
00:09:39,480 --> 00:09:42,200
zeros, we manage to get a positive response.
171
00:09:42,200 --> 00:09:45,800
The positive response here is the 6773.
172
00:09:45,800 --> 00:09:47,840
And the ECU grants access to us.
173
00:09:47,840 --> 00:09:52,360
And this eventually is a backdoor from our perspective.
174
00:09:52,360 --> 00:09:55,520
Of course, there is no security in this case.
175
00:09:55,520 --> 00:10:00,720
And while the tier one supplier, supply components
176
00:10:00,720 --> 00:10:04,160
might follow the OEM cyber security requirement, that
177
00:10:04,160 --> 00:10:07,280
doesn't mean that we only need to test by the book.
178
00:10:07,280 --> 00:10:12,080
As you saw, by enumerating and finding an extra security
179
00:10:12,080 --> 00:10:14,840
access subservice, we found out that we can bypass it
180
00:10:14,840 --> 00:10:19,840
easily without any calculation, any secret algorithm, or any
181
00:10:19,840 --> 00:10:20,800
secret key.
182
00:10:20,800 --> 00:10:25,840
And we can get direct access to it by only supplying zeros.
183
00:10:25,840 --> 00:10:29,520
In most cases, several misconfigurations exist
184
00:10:29,520 --> 00:10:32,120
outside of the cyber security requirements.
185
00:10:32,120 --> 00:10:36,520
The OEM doesn't know or doesn't want us to know.
186
00:10:36,520 --> 00:10:38,560
So they don't communicate it.
187
00:10:38,560 --> 00:10:43,600
And the tier ones did not inform the OEM in the end,
188
00:10:43,600 --> 00:10:46,680
which is the backdoor use case that we had now.
189
00:10:46,680 --> 00:10:47,960
Why?
190
00:10:47,960 --> 00:10:49,880
I don't know.
191
00:10:49,880 --> 00:10:52,240
The solution, from my perspective, from our
192
00:10:52,240 --> 00:10:57,360
perspective, for the OEM is to build more strict cyber
193
00:10:57,360 --> 00:10:59,040
security requirements.
194
00:10:59,040 --> 00:11:02,520
For the pen-less suppliers like us and the researchers is
195
00:11:02,520 --> 00:11:06,720
to build more robust methodology, which will cover
196
00:11:06,720 --> 00:11:09,920
a realistic amount of test cases.
197
00:11:09,920 --> 00:11:13,520
Don't build it solely based on the requirements.
198
00:11:13,520 --> 00:11:15,480
Stop thinking only about the requirements.
199
00:11:15,480 --> 00:11:19,200
Build it on the experience and the attack surface that you
200
00:11:19,200 --> 00:11:21,440
have in front of you.
201
00:11:21,440 --> 00:11:24,720
And of course, educate the client, OEM, tier one, or
202
00:11:24,720 --> 00:11:25,400
anyone else.
203
00:11:25,400 --> 00:11:28,040
Education is the biggest part here.
204
00:11:28,040 --> 00:11:32,200
We need the client to understand what we found and
205
00:11:32,200 --> 00:11:36,840
what can be the severity and the impact of it.
206
00:11:36,840 --> 00:11:40,080
Moving forward, everything will be changed in the end.
207
00:11:40,080 --> 00:11:43,400
But moving forward now, we need to talk about the main
208
00:11:43,400 --> 00:11:47,480
bridge of connectivity of a vehicle to the real world
209
00:11:47,480 --> 00:11:50,360
lately, which is the telematics unit, and how many
210
00:11:50,360 --> 00:11:54,840
vehicles get connected in the network that eventually they
211
00:11:54,840 --> 00:11:56,080
should not actually be.
212
00:11:58,600 --> 00:12:03,440
First of all, almost no vehicles ship anymore without a
213
00:12:03,440 --> 00:12:06,120
telematics unit.
214
00:12:06,120 --> 00:12:08,640
Main purpose of a telematics unit is the secure update
215
00:12:08,640 --> 00:12:12,240
procedures, which became a necessity.
216
00:12:12,240 --> 00:12:15,360
There are some regulations also.
217
00:12:15,360 --> 00:12:17,840
There are several running services, including a remote
218
00:12:17,840 --> 00:12:20,120
vehicle management in most cases.
219
00:12:20,120 --> 00:12:21,200
You can unlock doors.
220
00:12:21,200 --> 00:12:25,080
You can start vehicle conditioning and many other
221
00:12:25,080 --> 00:12:27,800
use cases that a user might need.
222
00:12:27,800 --> 00:12:28,520
Might not.
223
00:12:28,520 --> 00:12:29,440
I don't know.
224
00:12:29,440 --> 00:12:32,640
And the TLDR is that please consider the applicable
225
00:12:32,640 --> 00:12:36,920
connectivity while designing the architecture.
226
00:12:36,920 --> 00:12:39,680
So now that we got a first taste of how things are
227
00:12:39,680 --> 00:12:43,400
getting connected, let's dive into a real world scenario of
228
00:12:43,400 --> 00:12:46,520
a supercar manufacturer in this case that pushed the
229
00:12:46,520 --> 00:12:49,640
connectivity of their pre-production vehicle in
230
00:12:49,640 --> 00:12:53,080
order to perform secure updates and remote management
231
00:12:53,080 --> 00:12:58,120
of the fleet for personalized support of their clients.
232
00:12:58,120 --> 00:13:01,280
In this case, and as a first part, we have a telematics
233
00:13:01,280 --> 00:13:04,640
unit, an ECU handling the cellular connectivity and the
234
00:13:04,640 --> 00:13:06,720
connection to the internet.
235
00:13:06,720 --> 00:13:09,760
And this telematics unit is connected to the main head
236
00:13:09,760 --> 00:13:13,560
unit over some kind of interface.
237
00:13:13,560 --> 00:13:17,320
It can be an RS485, serial, Broadridge, which is
238
00:13:17,320 --> 00:13:20,360
automotive ethernet, or anything else that is
239
00:13:20,360 --> 00:13:23,200
applicable in automotive.
240
00:13:23,200 --> 00:13:26,240
At this point, one ECU is already connected.
241
00:13:26,240 --> 00:13:29,800
And considering that this kind of ECUs usually come with
242
00:13:29,800 --> 00:13:32,840
several publicly available services, in many cases,
243
00:13:32,840 --> 00:13:37,120
including SSAs, you can understand that this kind of
244
00:13:37,120 --> 00:13:40,040
risk is not implemented properly.
245
00:13:40,040 --> 00:13:43,960
But there are proper implementations limiting the
246
00:13:43,960 --> 00:13:46,920
exposure at the minimum using hypervisors, for example, on
247
00:13:46,920 --> 00:13:50,520
the head unit to isolate the exposed system from the rest
248
00:13:50,520 --> 00:13:53,520
of the ECUs and the connectivity in the vehicle,
249
00:13:53,520 --> 00:13:57,440
and gateways that filter all requests coming from the
250
00:13:57,440 --> 00:13:59,560
exposed unit.