It’s 2017 and Hayes AT modem commands can hack luxury cars
Telematics torched in BMWs, Infinitis, Nissan Leaf and some Fords
Updated A bunch of mid-age Ford, Infiniti, Nissan and BMW vehicles are carrying around a vulnerable chipset from Infineon that America's ICS-CERT reckons is easy to exploit.
The BMWs went on sale between 2009 and 2010, the affected Infiniti models were built between 2013 and 2015 and there's a chance Nissan Leafs manufactured between 2011 to 2015 have bugs. A handful of Ford hybrids may also be in trouble.
In IT terms a 2009 product is close to end-of-life; a car that age might still be covered by an extended warranty (and in Australia, by parts of the 10-year statutory warranty).
Infineon's contribution to the problem is a 2G baseband chipset, the S-Gold 2 (part number PMB 8876), used by upstream German vendor Continental to produce telematics control units (TCUs).
The first vulnerability is a stack-based buffer overflow that ICS-CERT says is only exploitable by an attacker with physical access to the car.
Old-timers will get nostalgic and weepy at this point: the vulnerability is exposed by the modem's AT command set. As detailed in this DEFCON presentation (PDF), the commands are AT+STKPROF, AT+XAPP, AT+XLOG and AT+FNS.
The second – which is remotely exploitable if you can get a 2G connection – lets an attacker “access and control memory” for “remote code execution on the baseband radio processor of the TCU.”
The discoverers, McAfee researchers Mickey Shkatov, Jesse Michael and Oleksandr Bazhaniuk, note in the presentation that the exploits for the firmware in question were outlined by Ralf-Philip Weinmann in the iOS Hacker's Handbook in 2016.
So, as ICS-CERT says, “public exploits are available”.
The best mitigation, it seems, is to deactivate the TCU, which Nissan and Infiniti and Ford (since last year) are implementing; BMW told ICS-CERT it will put a program in place for customers. ®
Updated to add
Mickey Shkatov got in touch to point out that the remote exploit doesn't need a 2G network to exist. It's cheap and easy to buy an open-source 2G-capable base station: "If an attacker sets their own malicious base station and your tcu connects to it that would be enough to trigger the tmsi vulnerability. All the tcu has to do to be exploited is to be powered on and looking for signal", he wrote in an email.
An updated version of the DEFCON slideshow is here.