Some Honda cars can be broken into with just a portable radio.

Millions of Honda cars could be vulnerable to remote keyfob hacking

The company told TechRadar Pro: “We can confirm the researcher’s claim that it is possible to use sophisticated technical tools and know-how to mimic Remote Keyless commands and gain access to certain media or ours. want to reassure our customers that this particular type of attack, which requires the near-continuous reception of multiple sequential RF lines, cannot be used to control the vehicle away. Moreover, Honda regularly improves security features as new models are introduced that can hinder this and similar methods.”

Some Honda cars could be broken into with just a portable radio
Some Honda cars could be broken into with just a portable radio

The company also notes that to be driven, even if a car starts remotely, it is necessary to have a valid key with a separate fixed chip that must be in the car.

Original story: Millions of Honda cars could be at risk of being accessed by external users after discovering a new remote hacking vulnerability.

Security researchers from the Star-V Lab have discovered a technique that allows anyone to unlock the car, open the door and even start the engine with a handheld radio due to a flaw in the car’s keyfob.

Some of Honda’s flagship models released between 2012 and 2022 appear to be affected by the vulnerability, including the Accord, Civic, C-RV and X-RV.

Honda fault

The researchers teamed up with journalist Rob Stumpf from The Drive (open in the new tab) to point out the vulnerability they named Rolling-PWN.

The problem lies in the roll-code mechanism, including in the keyless input system (also known as keyfob) to prevent “man-in-the-middle” attacks from replaying.

The team found that every time the keyfob button was pressed, it increased the likelihood that certain codes would be accepted to grant access to the vehicle. The team noted that the receiver inside the car mainly accepts “sliding code windows” to avoid accidentally pressing the key.

Each time the button is pressed, the rolling code synchronization counter will increase, and therefore, by sending certain commands in a row, the counter will synchronize again, opening up previous commands that can be used to access the vehicle.

“The Rolling-PWN bug is a serious vulnerability,” the team wrote in a blog post (open in the new tab) outlining their findings. “We found it in an attack-prone version of the rolling code mechanism, which is done on a large number of Honda vehicles.”

The researchers note that anyone using a particular type of vehicle could be at risk, and users couldn’t even spot whether the vulnerability had been used against them.

They also warned that the threat could affect vehicles from other brands, and Honda now appears to have no remedy or even noticed the problem. The researchers noted that they tried to submit the report, but couldn’t figure out the appropriate way to do it, so instead, they contacted Honda Customer Service.

A Honda spokesperson told Vice (open in the new tab) that the report was unreliable and that the allegations were unfounded.

The company said: “The key pins in the referenced vehicles are equipped with rolling code technology that does not allow for security vulnerabilities as presented in the report.”

“In addition, the videos provided as evidence of the absence of a slide code do not include sufficient evidence to support the claims,” the company added.

Written by admin

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Portable SSD are not cheap, but I've never paid full price for them

Mobile SSDs aren’t cheap, but I’ve never paid the full price for them

Industrial cyberattacks are hitting nearly all IoT companies

Industrial cyber attacks are attacking nearly all IoT companies