
Tom Wimmenhove, a Dutch electronics designer, has discovered a flaw in the key fob system used by several Subaru models, a vulnerability the vendor has not patched and could be abused to hijack cars.
The issue is that key fobs for some Subaru cars use sequential codes for locking and unlocking the vehicle, and other operations.
These codes — called rolling codes or hopping code — should be random, in order to avoid situations when an attacker discovers their sequence and uses the flaw to hijack cars.
Car thieves can create duplicate, fully-working key fobs
Wimmenhove discovered the problem by sniffing the radio signals sent out by his own car's key fob, which is nothing more than a short-range radio transmitter.
The electronics expert quickly realized that he could "clone" the key fob and create a fully-working, unauthorized duplicate.
"By receiving a single packet from the key fob (i.e. the user pressed any of the buttons on the fob while the attacker was within range), the attacker can use that packet to predict the next rolling code and use that to lock, unlock, unlock trunk or sound the alarm of the car," Wimmenhove told Bleeping Computer.
Attack rig created using off-the-shelf electronic components
The vulnerability is easy to exploit and doesn't require advanced coding skills. The cyber-criminal underworld is full of hardware hackers that could easily replicate what Wimmenhove achieved.
A car thief would need to create a simple rig that can pick up the key fob's radio signal, compute the next rolling code, and send out a similar radio signal back to the car after the owner has left.
The rig to carry out such attacks is not even expensive, varying from $15 to $30, depending on price and used components.
"Currently, I'm using a Raspberry Pi B+ ($25), a Wi-Fi dongle ($2) and a TV dongle ($8), but the Raspberry Pi B+ and WiFi dongle could both be replaced with a single Raspberry Pi Zero W ($10), which has WiFi on board," Wimmenhove told Bleeping.
"Then you need a 433MHz antenna ($1) and an MCX to SMA convertor ($1) to stick the antenna onto the dongle," he added. "Finally, you need something to power the thing. I'm assuming most people have some kind of Lithium-Ion power bank laying around. If not, they don't cost much either."
Several Subaru models affected
Wimmenhove tested the rig on his own 2009 Subaru Forester, but says the exploit should also work on the following models:
2005 - 2010 Subaru Forester
2004 - 2011 Subaru Impreza
2005 - 2010 Subaru Legacy
2005 - 2010 Subaru Outback
Bleeping Computer asked the researcher to prove his work, and the following video was provided at request:
Subaru is aware but has not patched the issue
The researcher also said he reached out to Subaru about his findings.
"I did [reach out]. I told them about the vulnerability and shared my code with them," Wimmenhove told Bleeping. "They referred me to their 'partnership' page and asked me to fill in a questionnaire. It didn't seem like they really cared and I haven't heard back from them."
Subaru did not respond to three requests for comment from Bleeping Computer made over 36 hours before publication.
The code needed to run Wimmenhove's attack rig, along with instructions, are now on GitHub. Bleeping Computer is not sharing the link in this article.
Comments
Steve Holle - 10 months ago
Good for you, not sharing the link!
slade4g63 - 10 months ago
Not that most people have the knowledge to compile the script in linux, or know much about a raspberry pi to pull it off. A simple google search is easy enough to find his Github with his name in the article. I for one, want to test this out on my car.
pccobbler - 10 months ago
Subaru and other car companies want to unleash so-called autonomous vehicles on our streets where our children play -- Subaru has introduced a "traffic jam assist function [which] will allow the car to start and stop automatically in slow traffic and steer the car automatically around curves ... by 2020, Subaru said it will introduce a semiautonomous driving function for highway driving" (Automotive News, March 7, 2016) -- yet Subaru does not believe it's important to respond to a major player in the security business regarding their pesky bugs.