Incident: Security Vulnerability in Progressive Insurance's SnapShot Dongle Leads to Potential Car Hacking

Published Date: 2015-01-21

Postmortem Analysis
Timeline 1. The software failure incident involving the vulnerability of the SnapShot device used by Progressive Insurance happened around January 2015. [32684]
System 1. SnapShot gadget by Progressive Insurance 2. Firmware running on the dongle 3. CAN bus system within the car [32684]
Responsible Organization 1. Hackers were responsible for causing the software failure incident by exploiting the security vulnerability in the Snapshot device, allowing them to potentially affect steering or braking in vehicles [32684].
Impacted Organization 1. Users of the electronic gadget that alerts insurance firms of people's driving habits [32684]
Software Causes 1. Lack of security measures in the SnapShot gadget, making it vulnerable to hacking [32684] 2. Minimal and insecure firmware on the dongle, allowing for remote control of the vehicle [32684] 3. No validation or signing of firmware updates, no secure boot, no cellular authentication, no secure communications or encryption, no data execution prevention or attack mitigation technologies in the SnapShot gadget [32684]
Non-software Causes 1. Lack of security measures in the design of the SnapShot gadget, making it vulnerable to hacking attempts [32684]. 2. Failure to disclose potential vulnerabilities to the manufacturer, Xirgo Technologies, which could have led to timely corrective actions [32684].
Impacts 1. The software failure incident involving the SnapShot device used by Progressive Insurance had the potential for hackers to gain control of the car's steering or braking systems, posing a significant safety risk to drivers [32684]. 2. The lack of security measures in the SnapShot device firmware allowed for the possibility of compromising the dongles to achieve remote control of vehicles or entire fleets, leading to privacy data loss or even physical harm [32684]. 3. The incident highlighted the broader issue of cybersecurity vulnerabilities in connected vehicles, indicating that as cars become more connected, they are susceptible to similar threats seen in the PC and smartphone world, potentially impacting features like self-parking, active lane control, and adaptive cruise control [32684].
Preventions 1. Implementation of robust security measures in the software and firmware of the SnapShot device, such as encryption, secure boot, secure communications, and data execution prevention [32684]. 2. Regular security audits and testing of the SnapShot device to identify and address potential vulnerabilities before they can be exploited by hackers [32684]. 3. Proactive communication and collaboration between security researchers like Corey Thuen and the manufacturer, Xirgo Technologies, to address security vulnerabilities promptly and effectively [32684]. 4. Enhanced communication and disclosure processes between security researchers and companies like Progressive Insurance to ensure that potential vulnerabilities are reported and addressed in a timely manner to prevent exploitation [32684].
Fixes 1. Implementing robust security measures in the SnapShot device, such as firmware validation, secure boot, secure communications, encryption, data execution prevention, and attack mitigation technologies [32684]. 2. Conducting thorough security testing and audits on the SnapShot device to identify and address vulnerabilities before they can be exploited by hackers [32684]. 3. Enhancing communication and collaboration between security researchers like Corey Thuen and the manufacturers of the device, Xirgo Technologies, to promptly address security vulnerabilities and prevent potential risks [32684].
References 1. Security expert Corey Thuen from consultancy firm Digital Bond [32684] 2. Progressive Insurance [32684] 3. Manufacturer of the SnapShot device, Xirgo Technologies [32684] 4. David Emm, principal security researcher at Kaspersky Lab [32684]

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown (a) The software failure incident related to the vulnerability of the SnapShot device used by Progressive Insurance has not been reported to have happened again within the same organization or with its products and services. Therefore, there is no information available in the provided article to suggest a similar incident occurring again at Progressive Insurance. (b) The article does not mention any similar incident happening at other organizations or with their products and services related to the specific vulnerability of the SnapShot device used by Progressive Insurance. Thus, there is no indication of this software failure incident occurring again at multiple organizations based on the information provided in the article.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The incident with the SnapShot device used by Progressive Insurance highlights a significant design flaw in the system. The device, which is meant to monitor driving habits for insurance purposes, was found to be vulnerable to hacking due to its lack of security measures. The security expert, Corey Thuen, discovered that the firmware running on the dongle was minimal and insecure, lacking essential security technologies such as secure boot, secure communications, encryption, and more. This design flaw allowed hackers to potentially gain remote control of a vehicle or a fleet of vehicles, leading to severe consequences ranging from privacy data loss to life-threatening situations [32684]. (b) The software failure incident related to the operation phase is also evident in the article. The vulnerability of the SnapShot device to hacking highlights an operational failure in the system. Despite the potential security risks identified by the security expert, Corey Thuen, the manufacturer of the device, Xirgo Technologies, did not respond to the notification of the security vulnerability. Additionally, Progressive Insurance expressed disappointment that Thuen did not share his findings with them privately before presenting the flaw at a hacking conference. This lack of communication and response between the involved parties reflects an operational failure in addressing and mitigating the identified security risks in a timely and effective manner [32684].
Boundary (Internal/External) within_system (a) within_system: The software failure incident in the article is related to within_system factors. The security vulnerability in the SnapShot device used by Progressive Insurance was due to the minimal and insecure firmware running on the dongle. The lack of security measures such as no validation or signing of firmware updates, no secure boot, no cellular authentication, no secure communications or encryption, and no data execution prevention made the device susceptible to hacking. The flaw was discovered by a security expert who reverse-engineered the software on the SnapShot device, highlighting the internal vulnerabilities within the system itself [32684]. (b) outside_system: The software failure incident in the article is not primarily related to outside_system factors. The vulnerability in the SnapShot device was a result of internal security flaws within the system rather than external factors beyond the control of the system. The article does not mention any external factors contributing to the software failure incident [32684].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the article is related to non-human actions, specifically the lack of security measures in the SnapShot gadget used by Progressive Insurance. The article mentions that the SnapShot device, which connects to a car's CAN bus system, lacks security technologies such as validation or signing of firmware updates, secure boot, secure communications, encryption, data execution prevention, or attack mitigation technologies. This lack of security measures makes it vulnerable to hacking, potentially allowing hackers to affect steering or braking of the vehicle remotely [32684]. (b) The software failure incident in the article also involves human actions. The security expert, Corey Thuen, reverse-engineered the software included on the SnapShot device and discovered the security vulnerabilities that could allow hackers to compromise the device and gain remote control of a vehicle or a fleet of vehicles. Additionally, Thuen contacted the manufacturer of the SnapShot device, Xirgo Technologies, to inform them of the security vulnerability, but reportedly received no response. Progressive Insurance expressed disappointment that Thuen did not share his findings with them privately before presenting the flaw at a hacking conference, indicating a lack of communication between the parties involved [32684].
Dimension (Hardware/Software) hardware, software (a) The software failure incident occurring due to hardware: - The article reports on a software failure incident where an electronic gadget called SnapShot, used by Progressive Insurance to monitor driving habits, could be hacked to potentially affect steering or braking of vehicles [32684]. - The vulnerability was found in the SnapShot device, which connects to a car's CAN bus system through the car's diagnostic port. The lack of security measures in the device allowed hackers to potentially gain control over the vehicle's functions [32684]. (b) The software failure incident occurring due to software: - The software failure incident in this case was primarily due to the lack of security measures in the firmware running on the SnapShot device. The firmware was described as minimal and insecure, lacking validation or signing of firmware updates, secure boot, secure communications, encryption, and other security technologies [32684]. - The software failure incident was exacerbated by the fact that the manufacturer of the SnapShot device, Xirgo Technologies, did not respond to the security vulnerability report, indicating a lack of proper software security response mechanisms [32684].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in the article is malicious in nature. The incident involves a security vulnerability in the SnapShot gadget used by Progressive Insurance, which could be exploited by hackers to gain remote control of a vehicle, potentially affecting steering or braking. The security expert who reverse-engineered the software on the SnapShot device highlighted the lack of security measures, such as no validation or signing of firmware updates, no secure boot, no secure communications or encryption, among others. This lack of security technologies makes the device vulnerable to skilled attackers who could compromise it for malicious purposes, ranging from privacy data loss to life-threatening consequences [32684]. (b) The incident does not involve a non-malicious software failure.
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the Snapshot device used by Progressive Insurance to monitor driving habits was primarily due to poor decisions made in the design and implementation of the software. The device was found to be vulnerable to hacking, with minimal security measures in place. The firmware running on the dongle was described as minimal and insecure, lacking basic security technologies such as secure boot, secure communications, encryption, and attack mitigation technologies [32684]. The security expert who reverse-engineered the software on the Snapshot device highlighted the lack of security measures, stating that a skilled attacker could compromise the dongles to gain remote control of a vehicle or even an entire fleet of vehicles. The consequences of such a compromise were deemed potentially disastrous, ranging from privacy data loss to life and limb [32684]. The incident also involved poor communication and response from the manufacturer of the Snapshot device, Xirgo Technologies, as they reportedly did not respond to the security vulnerability report from the researcher who discovered the flaw. Progressive Insurance expressed disappointment in the way the vulnerability was revealed and emphasized the importance of disclosing potential vulnerabilities to them first for evaluation and correction [32684].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident in the article can be attributed to development incompetence. The security expert, Corey Thuen, reverse engineered the software included on the SnapShot device and found significant security vulnerabilities. He highlighted that the firmware running on the dongle is minimal and insecure, lacking essential security measures such as validation or signing of firmware updates, secure boot, secure communications or encryption, among others. This lack of security technologies in the software indicates a failure in professional competence during the development of the gadget [32684]. (b) Additionally, the failure to address the security vulnerability in the SnapShot device can be seen as accidental. Progressive Insurance expressed disappointment that the security flaw was publicly revealed at a hacking conference instead of being disclosed to them privately. The company stated that they would have preferred to receive information about the potential vulnerability so they could evaluate and correct it before it could be exploited. The lack of private disclosure and subsequent public exposure of the vulnerability can be considered an accidental aspect of the software failure incident [32684].
Duration permanent (a) The software failure incident described in the article is more likely to be considered as a permanent failure. The security vulnerability in the SnapShot device used by Progressive Insurance was highlighted by a security expert who reverse-engineered the software and found significant flaws in its security measures. The expert mentioned that the firmware running on the dongle is minimal and insecure, lacking essential security technologies such as secure boot, secure communications, encryption, and attack mitigation technologies. This lack of security measures makes the device vulnerable to hacking, potentially allowing attackers to gain remote control of a vehicle or a fleet of vehicles, leading to severe consequences ranging from privacy data loss to life-threatening situations [32684]. (b) The software failure incident can also be seen as a temporary failure in terms of Progressive Insurance's response to the security vulnerability. The company expressed disappointment that the security flaw was publicly revealed at a hacking conference before being disclosed to them privately. Progressive Insurance stated that they would prefer individuals to report potential vulnerabilities to them first so that they could evaluate and correct them before any exploitation occurs. The company also mentioned that they would welcome detailed input to properly evaluate the claims regarding the security vulnerability. Additionally, the security expert who discovered the vulnerability reportedly contacted the manufacturer of the SnapShot device to inform them of the issue but received no response, indicating a lack of immediate action to address the problem [32684].
Behaviour byzantine, other (a) crash: The software failure incident described in the article does not specifically mention a crash where the system loses state and does not perform any of its intended functions. (b) omission: The incident does not directly relate to the system omitting to perform its intended functions at an instance(s). (c) timing: The software failure incident does not involve the system performing its intended functions correctly but too late or too early. (d) value: The incident does not involve the system performing its intended functions incorrectly. (e) byzantine: The behavior of the software failure incident can be categorized as a byzantine failure. The article describes how hackers could theoretically affect steering or braking by gaining access to the SnapShot gadget, which connects to the car's CAN bus system. This unauthorized access could lead to inconsistent and potentially dangerous interactions with the vehicle's components [32684]. (f) other: The behavior of the software failure incident can also be described as a security vulnerability. The lack of security measures in the SnapShot gadget, such as no validation or signing of firmware updates, no secure boot, no secure communications or encryption, exposes the system to potential attacks and compromises [32684].

IoT System Layer

Layer Option Rationale
Perception sensor, network_communication, embedded_software (a) sensor: The software failure incident mentioned in the article is related to the sensor layer of the cyber physical system. The article discusses how hackers could potentially access certain functions of the car's CAN bus system through the Snapshot gadget, which connects to the car via this system. This access could allow hackers to affect steering or braking, indicating a vulnerability in the sensor layer of the system [32684]. (b) actuator: The article does not specifically mention any contributing factors related to actuator errors in the software failure incident. (c) processing_unit: The software failure incident does not directly point to any contributing factors introduced by processing errors in the cyber physical system. (d) network_communication: The failure in the software incident is related to network communication errors. The article discusses how the Snapshot gadget connects to the car's CAN bus system, and hackers could potentially affect steering or braking by gaining access to this system, highlighting a vulnerability in the network communication layer [32684]. (e) embedded_software: The failure in the software incident is related to embedded software errors. The security expert who reverse-engineered the software on the Snapshot gadget found that the firmware running on the dongle is minimal and insecure, lacking security technologies such as secure boot, encryption, and attack mitigation. This vulnerability in the embedded software could allow skilled attackers to compromise the dongles and gain remote control of vehicles, emphasizing a flaw in the embedded software layer of the system [32684].
Communication link_level The software failure incident described in the article is related to the communication layer of the cyber physical system that failed at the link_level. The failure was due to contributing factors introduced by the wired or wireless physical layer. The article mentions that hackers were able to access certain functions of the car's CAN bus, which is a standard system allowing various computers and components inside a car to communicate with each other. The SnapShot device connects to the car via this system, and hackers could theoretically affect steering or braking by gaining access to it [32684].
Application TRUE The software failure incident described in the article [32684] was related to the application layer of the cyber physical system. The failure was due to security vulnerabilities in the SnapShot gadget used by Progressive Insurance, which allowed hackers to potentially access and affect critical functions of the car's CAN bus system, such as steering or braking. The security expert who reverse-engineered the software on the SnapShot device highlighted the lack of security measures in the firmware, making it susceptible to remote control by skilled attackers. This vulnerability falls under the category of a failure introduced by bugs and lack of security technologies at the application layer of the system.

Other Details

Category Option Rationale
Consequence death, harm, property, non-human, theoretical_consequence (a) death: People lost their lives due to the software failure - The article mentions that a security expert claimed that a skilled attacker could compromise the dongles to gain remote control of a vehicle, potentially leading to consequences ranging from privacy data loss to life and limb [32684].
Domain unknown (a) The failed system in the article is related to the insurance industry, specifically Progressive Insurance's use of the SnapShot gadget to monitor people's driving habits and personalize insurance rates based on actual driving behavior [32684].

Sources

Back to List