CyberLock CyberKey-based access control solutions can be easily cloned, and new keys can be created from lost cylinders and keys regardless of the permissions granted to the key. (more…)
Year: 2015
Lenovo System Update Multiple Privilege Escalations
CVE-2015-2219 Local, least-privileged users can run commands as the SYSTEM user.
CVE-2015-2233 Local and potentially remote attackers can bypass signature validation checks and replace trusted Lenovo applications with malicious applications.
CVE-2015-2234 Local, unprivileged users can run commands as an administrative user. (more…)
Petcube Remote Wireless Pet Camera Vulnerabilities
The security and privacy of Petcube users could be compromised through unauthorized access. (more…)
Lawsuit counterproductive for automotive industry
It came to my attention that there is a lawsuit attempting to seek damages against automakers revolving around their cars being hackable.
The lawsuit cites Dr. Charlie Miller’s and my work several times, along with several other researchers who have been involved in automotive security research.
I’d like to be the first to say that I think this lawsuit is unfortunate and subverts the spirit of our research. Charlie and I approached our work with the end goals of determining if technologically advanced cars could be controlled with CAN messages and informing the public of our findings. Obviously, we found this to be true and were surprised at how much could be manipulated with network messages. We learned so much about automobiles, their communications, and their associated physical actions.
Our intent was never to insinuate deliberate negligence on the part of the manufacturers. Instead, like most security researchers, we wanted to push the boundaries of what was thought to be possible and have fun doing it. While I do believe there is risk associated with vehicle connectivity, I think that a lawsuit can only be harmful as it has the potential to take funds away from what is really important: securing the modern vehicle. I think any money automobile manufacturers must spend on legal fees would be more wisely spent on researching and developing automotive intrusion detection/prevention systems.
The automotive industry is not sitting idly by, but constantly working to improve the security of their past, present, and future vehicles. Security isn’t something that changes overnight, especially in the case of automobiles, which take even longer since there are both physical and software elements to be tested. Offensive security researchers will always be ahead of the people trying to formulate defenses, but that does not mean the defenders are not doing anything.
While our goals were public awareness and industry change, we did not want change to stem from the possible exploitation of public fears. Our hope was that by showing what is possible, we could work with the people who make the products we use and love on an everyday basis to improve vehicle security.
– cv
Life in the Fast Lane
- Why dedicate an entire service offering to vehicles and transportation?
- A brief history of vehicle security research and why it has been relatively scarce
- Why we believe that protecting vehicles and their supporting systems is of the utmost importance
- IOActive’s goals for our Vehicle Security Service offering
Additionally, I’ll make sure to save sufficient time for Q&A to field your questions. I’d love to get as many questions as possible, so don’t be shy.
I look forward to your participation in the webinar on February 5,2015 11 AM EST.