Skip to main content

Security loopholes found in BMW’s connected drive

On 30 January, security loopholes in BMW vehicles equipped with connected drive technologies were revealed. Believed to affect 2.2 million BMW vehicles worldwide, these flaws in the software allow thieves to unlock doors and track car data through a mobile phone without leaving a trace. The Federation Internationale de l'Automobile (FIA) has long advocated for secure, open networks for vehicle connectivity. Vehicle manufacturers have argued that only closed networks can be truly secure. In fact, the loop
January 30, 2015 Read time: 2 mins
On 30 January, security loopholes in 1731 BMW vehicles equipped with connected drive technologies were revealed. Believed to affect 2.2 million BMW vehicles worldwide, these flaws in the software allow thieves to unlock doors and track car data through a mobile phone without leaving a trace.

The Federation Internationale de l'Automobile (FIA) has long advocated for secure, open networks for vehicle connectivity. Vehicle manufacturers have argued that only closed networks can be truly secure. In fact, the loopholes in BMW’s closed, wireless connected car network prove that a closed network is not necessarily secure.

Jacob Bangsgaard, director general of FIA Region I said: “We are concerned about these findings as car owners have been unknowingly at risk of having their vehicle tracked and opened without a single trace. We have always supported strong data protection for consumers, which should be the leading concern as connected vehicles come to market. As has been proven in this example, a closed network does not necessarily result in data security and car owners must be assured that their vehicle data cannot be abused by tracking or theft.”

The gaps in security were discovered as part of a study performed by the German Automobile Club, ADAC, to discover what repair and maintenance data is sent over the BMW network. The functions that were found to be accessible remotely were opening of doors, location of the vehicle, recorded speed data, programming of the emergency call number, and emails. BMW has announced that the security loopholes will be closed by 31 January 2015 by activating encrypted communication with the affected vehicles. This is the first-ever ‘digital recall’; it will not require a workshop call or the replacement of any parts and will be carried out remotely.

For more information on companies in this article

Related Content

  • Consumer Watchdog calls on NHTSA to strength rules on autonomous cars
    April 11, 2016
    The US Consumer Watchdog has called on the National Highway Traffic Safety Administration (NHTSA) to require a steering wheel, brake and accelerator so a human driver can take control of a self-driving robot car when necessary in the guidelines it is developing on automated vehicle technology. In comments for a NHTSA public meeting about automated vehicle technology, John M. Simpson, Consumer Watchdog's privacy project director, also listed ten questions he said the agency must ask Google about its self-
  • US updates ITS strategy for Connected Vehicle deployment
    March 16, 2015
    Jon Masters looks at the USDOT’s new ITS Strategic Plan for the next five years. Emphasis and direction for the next five years of Government led ITS research in the United States has been framed within a new ITS Strategic Plan. The US Department for Transportation’s (USDOT) ITS Joint Program Office (JPO) published the report at the tail end of 2014 after concluding a two-year ITS industry consultation process. The Plan identifies a vision to transform the way society moves and the ITS JPO’s aim of advancin
  • US IntelliDrive cooperative infrastructure programme
    February 2, 2012
    The 'rebranding' of the US's Vehicle-Infrastructure Integration programme as IntelliDrive marks an effort to make the whole undertaking more accessible both in terms of nomenclature and technology. Shelley Row, director of the ITS Joint Program Office within USDOT's Research and Innovative Technology Administration, talks about the changes
  • Cloud computing technology benefits GIS
    July 17, 2012
    Geographic Information Systems are a relatively late adopter of cloud computing,but the benefits of host services for geospatial data and analysis are becoming clear. Jason Barnes reports Both the concept and the reality of cloud computing have been around for some time. More and more industry sectors are entrusting external service providers with the provision of their computing services via the internet. However, the Geographic Information System (GIS) industry has been slow to embrace the trend. This is