Subaru Security Vulnerability Uncovered Millions of Vehicles to Tracking, Unapproved Access, and Remote Start Dangers

Subaru Security Vulnerability Uncovered Millions of Vehicles to Tracking, Unapproved Access, and Remote Start Dangers

Subaru Security Vulnerability Uncovered Millions of Vehicles to Tracking, Unapproved Access, and Remote Start Dangers


### Subaru Security Vulnerability: An In-Depth Examination of Remote Access Threats

In an alarming discovery, a critical security vulnerability was identified within Subaru’s connected car systems, permitting unauthorized access to a large number of vehicles. Security expert Sam Curry’s examination of the MySubaru Mobile App led him to findings that revealed not only the capacity for remote tracking but also the power to unlock and start vehicles without the owner’s approval. This article delves into the ramifications of this vulnerability, the tactics employed for exploitation, and the overarching issues related to automotive cybersecurity.

#### The Discovery Journey

Curry’s exploration commenced with a distinctive arrangement with his mother: he would buy her a Subaru if she allowed him to evaluate its security. At first, he concentrated on the MySubaru Mobile App, but he soon understood that the app did not have any apparent flaws. Leveraging his expertise in automotive security, he redirected his focus to Subaru’s applications intended for employee use, which typically have wider permissions than those designed for consumers.

With the support of a colleague, Curry identified a sub-domain that required employee login credentials. By examining the JavaScript directory, they stumbled upon insecure password reset code, enabling them to reset the password using a valid employee email address they discovered through a straightforward web search. The final obstacle was two-factor authentication (2FA), which they navigated with relative simplicity, as it was client-side and could be deactivated locally.

#### Accessing Confidential Data

Upon gaining access to the system, Curry uncovered a trove of confidential information. The “Last Known Location” feature allowed him to enter his mother’s last name and ZIP code, disclosing a full year’s worth of accurate location data for her vehicle—within a five-meter range. This shocking capability highlighted the potential for abuse, as anyone with comparable access could monitor individuals without their awareness.

The researchers managed to gain remote control over any Subaru outfitted with Starlink technology. They performed a test on a friend’s vehicle, successfully adding themselves as authorized users without notifying the car’s owner. This showcased a significant flaw in the security protocols that govern user access and vehicle operation.

#### Prompt Action and Solutions

Curry quickly informed Subaru of the vulnerability, and the company responded expeditiously, implementing a resolution within 24 hours. They also verified that there was no indication of unauthorized access before the discovery. While this rapid response is praiseworthy, the occurrence poses critical inquiries regarding the security of connected vehicles and the likelihood of similar vulnerabilities in additional automotive systems.

#### Wider Implications for Automotive Cybersecurity

Curry’s discoveries underscore a major challenge facing the automotive sector: the inherent trust placed in employees and their extensive access to sensitive data. As Curry pointed out, the capacity for an 18-year-old employee in Texas to retrieve billing information for a vehicle situated in California highlights a system that relies heavily on internal trust rather than stringent security practices.

The automotive industry is progressively adopting connected technologies that offer enhanced convenience while also presenting new dangers. As vehicles become increasingly interconnected, the risk of cyberattacks escalates, necessitating a reassessment of security protocols and access permissions.

#### Final Thoughts

The Subaru security vulnerability acts as a crucial reminder for both consumers and manufacturers. As vehicles evolve into more advanced technological systems, the significance of cybersecurity cannot be minimized. Manufacturers must prioritize the application of rigorous security measures to safeguard user data and vehicle integrity. Meanwhile, consumers should stay alert and educated about the potential hazards associated with connected vehicles.

In a time where technology saturates every facet of our lives, securing our vehicles transcends mere luxury—it’s an essential need. The Subaru incident serves as a reminder that while innovation propels the automotive industry forward, it must be matched by a commitment to protect against emerging threats.