Skip to main content

Millions of cars at risk due to flaw in keyless entry systems, say researchers

Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models. The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods. Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key
August 15, 2016 Read time: 3 mins
Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models.

The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods.

Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key fob and then employ those signals to clone the key.

Though most automotive immobiliser systems have been shown to be insecure in the last few years, the security of remote keyless entry systems to lock and unlock a car based on rolling codes has received less attention.

The team, Flavio D. Garcia, David Oswald and Pierre Pavlidès, from the School of Computer Science at the University of Birmingham and Timo Kasper of Kasper & Oswald, found that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few global master keys.  

By recovering the cryptographic algorithms and keys from electronic control units, a thief would be able to clone a VW Group remote control and gain unauthorised access to a wirelessly unlock practically every vehicle the Volkswagen group has sold for the last two decades, including makes like Audi and Škoda, by eavesdropping a single signal sent by the original remote.

A second case study outlines an attack that could affect millions more vehicles, including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel/Vauxhall, Renault, and Peugeot.

The researchers devised a correlation-based attack on Hitag2, which allows recovery of the cryptographic key and thus cloning of the remote control with four to eight rolling codes and a few minutes of computation on a laptop.

Oswald explained, “You only need to eavesdrop once. From that point on you can make a clone of the original remote control that locks and unlocks a vehicle as many times as you want. Manufacturers really need to take heed and review their security systems.”

Garcia added, “It’s a bit worrying to see security techniques from the 1990s used in new vehicles. If we want to have secure, autonomous, interconnected vehicles, that has to change. Unfortunately the fix won’t be easy, as there is quite a slow software development cycle, new designs will be quite a long time in the making.”

The researchers suggest that car owners with affected vehicles avoid leaving any valuables in their car, and consider giving up on wireless key fobs altogether and open and lock their car doors the ‘old-fashioned’, mechanical way.

Related Content

  • May 10, 2019
    SafeRide: it’s time to act on cyberattacks
    Cyber threats are increasing rapidly and conventional security measures are unable to keep up. Ben Spencer talks to SafeRide’s Gil Reiter about what OEMs can do now As more vehicles become connected, so the potential threats to their security increase. Gil Reiter, vice president of product management for security firm SafeRide, says the biggest ‘attack surface’ for connected cars is their internet connectivity - and the in-vehicle applications that use the internet connection. “The most vulnerable co
  • July 12, 2012
    European car manufacturers face world’s toughest CO2 targets
    Following the adoption yesterday of the European Commission's proposals to reduce CO2 emissions from cars and vans, the European Automobile Manufacturers' Association (ACEA) says it will now work with its members to conduct a full analysis of how the proposed targets should be reached as well as their feasibility, and what this means in practice for the industry as a whole.
  • April 10, 2014
    Subscribers to OEM telematics in Western Europe to exceed 42 million by 2019
    ABI research’s latest research finds that the number of subscribers to Factory-installed Safety and Security telematics services is set for solid growth in Western Europe at a CAGR of 47 per cent, reaching 42.5 million in 2019. “Traditional safety and security telematics continues its march forward in Europe with both VW’s Car-Net and GM/Opel’s OnStar scheduled for deployment. A slew of new electrical vehicles from VW, Tesla, BMW, Daimler, and others will also boost telematics uptake and awareness,” says
  • August 18, 2017
    Trend Micro discovers 'indefensible' car security/CAN standard flaw
    Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi