Skip to main content

Security loopholes found in BMW’s connected drive

On 30 January, security loopholes in BMW vehicles equipped with connected drive technologies were revealed. Believed to affect 2.2 million BMW vehicles worldwide, these flaws in the software allow thieves to unlock doors and track car data through a mobile phone without leaving a trace. The Federation Internationale de l'Automobile (FIA) has long advocated for secure, open networks for vehicle connectivity. Vehicle manufacturers have argued that only closed networks can be truly secure. In fact, the loop
January 30, 2015 Read time: 2 mins
On 30 January, security loopholes in 1731 BMW vehicles equipped with connected drive technologies were revealed. Believed to affect 2.2 million BMW vehicles worldwide, these flaws in the software allow thieves to unlock doors and track car data through a mobile phone without leaving a trace.

The Federation Internationale de l'Automobile (FIA) has long advocated for secure, open networks for vehicle connectivity. Vehicle manufacturers have argued that only closed networks can be truly secure. In fact, the loopholes in BMW’s closed, wireless connected car network prove that a closed network is not necessarily secure.

Jacob Bangsgaard, director general of FIA Region I said: “We are concerned about these findings as car owners have been unknowingly at risk of having their vehicle tracked and opened without a single trace. We have always supported strong data protection for consumers, which should be the leading concern as connected vehicles come to market. As has been proven in this example, a closed network does not necessarily result in data security and car owners must be assured that their vehicle data cannot be abused by tracking or theft.”

The gaps in security were discovered as part of a study performed by the German Automobile Club, ADAC, to discover what repair and maintenance data is sent over the BMW network. The functions that were found to be accessible remotely were opening of doors, location of the vehicle, recorded speed data, programming of the emergency call number, and emails. BMW has announced that the security loopholes will be closed by 31 January 2015 by activating encrypted communication with the affected vehicles. This is the first-ever ‘digital recall’; it will not require a workshop call or the replacement of any parts and will be carried out remotely.

For more information on companies in this article

Related Content

  • When caring about sharing is good business for US automakers
    October 28, 2015
    Although car-sharing and ride-sharing could drastically reduce car sales, David Crawford finds some US automakers are keen to participate in the sharing economy. Growing consumer interest in car- and ride-sharing, as opposed to outright ownership, and ride-sharer Uber’s recently stated intention to make its brand competitive with ownership on cost, are making the major US automotive manufacturers think seriously about their future sales prospects. Some have already begun exploring ways of entering the field
  • Cities get road priorities right
    March 22, 2022
    Cities including Paris, Milan and London have all announced serious expansions to their bicycling infrastructure over the last few years. The era of active travel is here, finds Alan Dron
  • UK drug-driving in the spotlight
    March 23, 2012
    A panel of scientists and academics is being established by the UK Department for Transport (DfT) to advise on the possible implementation of rules covering drug-driving, along the lines of existing drink-driving laws. MDMA, cocaine, opiates and cannabis are seen by the DfT as the primary drugs for consideration. The experts will examine whether such a law should be introduced, with elements such as possible legal limits to be looked into. If it is decided the move is technically feasible, with regard to pu
  • EdgeVis removes bandwidth barriers to mobile streamed video
    October 26, 2017
    A new generation of video compression can lower transmission costs of data and make streaming from mobile and body-worn cameras a reality, as Colin Sowman discovers. Bandwidth limitations have long been the bottleneck restricting the expanded use of video streaming for ITS, monitoring and surveillance purposes. Recent years have seen this countered to some degree by the introduction of ‘edge processing’ whereby ANPR, incident detection and other image processing is moved into (or close to) the camera, so