Incident: NissanConnect EV App Security Flaw Allows Unauthorized Access to Leafs

Published Date: 2016-02-25

Postmortem Analysis
Timeline 1. The software failure incident where Nissan disabled its NissanConnect EV smartphone app due to a security flaw allowing random commands to be sent to Leaf electric vehicles happened when security researcher Troy Hunt remotely accessed a British Leaf from Australia and posted the results on YouTube, prompting Nissan to shut down the app [40778]. 2. Published on 2016-02-25. 3. The software failure incident likely occurred in January 2016.
System 1. NissanConnect EV smartphone app 2. CarWings app 3. Nissan LEAF and eNV200 vehicles 4. Dedicated server for the app
Responsible Organization 1. Nissan - The software failure incident was caused by Nissan's failure to authenticate the connection between the remote user and the Leaf's systems, allowing unauthorized commands to be sent to the vehicles [40778].
Impacted Organization 1. Nissan owners who used the NissanConnect EV smartphone app [40778]
Software Causes 1. Lack of authentication in the connection between the remote user and the Leaf's systems, allowing anyone with knowledge of how to send commands to do so [40778].
Non-software Causes 1. Lack of authentication in the connection between the remote user and the Leaf's systems, allowing anyone with knowledge to send commands [40778].
Impacts 1. The software failure incident allowed a security researcher to send random commands to random Nissan Leaf electric vehicles using just a web browser and a vehicle identification number (VIN) [40778]. 2. The incident led to Nissan disabling its NissanConnect EV smartphone app, affecting users who relied on the app for controlling their vehicles remotely [40778]. 3. The flaw in the app's security system exposed the temperature control and other telematics functions to be accessible via a non-secure route, potentially compromising user privacy and vehicle control [40778].
Preventions 1. Implementing proper authentication mechanisms to verify the source of commands being sent to the NissanConnect EV app could have prevented the software failure incident [40778]. 2. Regular security audits and testing of the app's systems could have helped identify vulnerabilities before they were exploited by malicious actors [40778]. 3. Promptly addressing reported security flaws and vulnerabilities by actively working on fixes and updates could have prevented the incident from escalating [40778].
Fixes 1. Implement proper authentication mechanisms to ensure that commands sent to the Leaf's systems are coming from verified sources [40778]. 2. Conduct a thorough security audit of the NissanConnect EV app to identify and address any other potential vulnerabilities that could be exploited [40778]. 3. Develop and deploy a secure update or patch to fix the issue with the dedicated server for the app that enabled non-secure access to temperature control and other telematics functions [40778].
References 1. Security researcher Troy Hunt [40778] 2. Nissan statement [40778] 3. Independent IT consultant [40778] 4. Benjamin Hunting at SlashGear [40778]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident related to the NissanConnect EV app being vulnerable to unauthorized commands has happened again within the same organization. This incident was not the first time such a vulnerability was discovered in Nissan's software. The article mentions that the security flaw was discovered by a security researcher who was able to send random commands to Nissan Leafs with just a web browser and a VIN [40778]. This indicates a recurring issue within Nissan's software systems. (b) There is no specific mention in the provided article about a similar incident happening at other organizations or with their products and services. Therefore, there is no information available to suggest that this particular software failure incident has occurred elsewhere.
Phase (Design/Operation) design (a) The software failure incident in Article 40778 occurred due to a design flaw in the NissanConnect EV smartphone app. The security researcher was able to exploit a vulnerability in the system's design that allowed him to send random commands to Nissan Leaf electric vehicles using just a web browser and a vehicle identification number (VIN). This flaw was attributed to the lack of authentication between the remote user and the Leaf's systems, indicating a design oversight by Nissan in ensuring secure communication channels [40778]. (b) The software failure incident in Article 40778 did not specifically mention any failure due to operation or misuse of the system. The primary cause of the incident was identified as a design flaw in the app's system that allowed unauthorized access and control over Nissan Leaf electric vehicles.
Boundary (Internal/External) within_system (a) within_system: The software failure incident with the NissanConnect EV smartphone app was due to contributing factors originating from within the system. The security flaw that allowed unauthorized access to control Nissan Leaf electric vehicles was a result of the connection between the remote user and the Leaf's systems not being authenticated. This lack of authentication on Nissan's side enabled anyone with knowledge of how to send commands to do so, as the system did not verify the commands' sources [40778].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in Article 40778 occurred due to non-human actions. The security flaw that allowed unauthorized access to Nissan's NissanConnect EV smartphone app and control over Leaf electric vehicles was a result of the connection between the remote user and the Leaf's systems not being authenticated. This lack of authentication enabled anyone with knowledge of how to send commands to do so, without the need for human participation in introducing the vulnerability [40778]. (b) The software failure incident in Article 40778 did involve human actions. The security researcher, Troy Hunt, discovered the vulnerability and responsibly disclosed it to Nissan before making it public. Nissan then took action to disable the app after being made aware of the flaw. Additionally, the statement from Nissan mentioned an internal investigation that found the issue with the dedicated server for the app, indicating human involvement in identifying and addressing the problem [40778].
Dimension (Hardware/Software) hardware, software (a) The software failure incident in Article 40778 occurred due to contributing factors originating in hardware. The incident involved a security flaw in Nissan's NissanConnect EV smartphone app, which allowed unauthorized users to send random commands to Nissan Leaf electric vehicles using just a web browser and a vehicle identification number (VIN). This flaw was possible because the connection between the remote user and the Leaf's systems was not authenticated, indicating a hardware-related vulnerability in the system [40778]. (b) The software failure incident in Article 40778 also had contributing factors originating in software. The flaw in the NissanConnect EV app, which enabled unauthorized access to vehicle controls, was a result of an issue with the dedicated server for the app. This issue allowed temperature control and other telematics functions to be accessible via a non-secure route, indicating a software-related vulnerability in the app's design and implementation [40778].
Objective (Malicious/Non-malicious) non-malicious (a) The software failure incident in this case was non-malicious. The incident occurred due to a security flaw in Nissan's NissanConnect EV smartphone app that allowed unauthorized users to send random commands to Nissan Leaf electric vehicles without proper authentication. The security researcher who discovered the flaw, Troy Hunt, responsibly disclosed the issue to Nissan before making it public. Nissan then disabled the app to address the vulnerability [40778]. (b) The software failure incident was not malicious and did not involve any intentional harm to the system.
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident involving NissanConnect EV smartphone app disabling was primarily due to poor decisions made by Nissan. The security flaw that allowed unauthorized access to control the Leaf electric vehicles was a result of the connection between the remote user and the Leaf's systems not being authenticated. This lack of authentication meant that anyone with knowledge of how to send commands could do so, as Nissan did not verify the commands' sources [40778]. Additionally, the incident highlights poor decision-making on Nissan's part as they did not address the issue promptly even after being informed by the security researcher, Troy Hunt. It took four weeks for any action to be taken, indicating a lack of urgency in addressing the security vulnerability [40778].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident in Article 40778 occurred due to development incompetence. The security flaw in the NissanConnect EV smartphone app that allowed unauthorized access to Nissan Leaf electric vehicles was a result of the connection between the remote user and the Leaf's systems not being authenticated. This lack of authentication allowed anyone with knowledge of how to send commands to do so, as Nissan's side did not verify the commands' sources [40778]. (b) The software failure incident in Article 40778 was not accidental but rather a result of a security flaw that was exploited by a security researcher who discovered the vulnerability and reported it to Nissan before making it public. The incident was not accidental but rather a consequence of a lack of proper authentication in the software system [40778].
Duration temporary The software failure incident described in Article 40778 can be categorized as a temporary failure. The NissanConnect EV smartphone app was disabled by Nissan after a security researcher discovered a flaw that allowed unauthorized access to control certain functions of Nissan Leaf electric vehicles. The app was taken offline temporarily to address the issue, with Nissan stating that the dedicated server for the app had an issue that enabled non-secure access to certain functions. There is no specific mention of the failure being permanent, indicating that it was a temporary measure to address the security vulnerability [40778].
Behaviour crash (a) crash: The software failure incident in the article can be categorized as a crash. The NissanConnect EV smartphone app was disabled after a security researcher discovered a flaw that allowed random commands to be sent to Nissan Leaf electric vehicles without proper authentication. This led to the app being shut down by Nissan, indicating a failure in the system's state and its inability to perform its intended functions [40778].

IoT System Layer

Layer Option Rationale
Perception network_communication, embedded_software (a) sensor: The software failure incident related to the NissanConnect EV app was not directly linked to a sensor error. The issue stemmed from a security flaw that allowed unauthorized access to the vehicle systems through the app without proper authentication [40778]. (b) actuator: The failure was not caused by an actuator error. Instead, it was due to a vulnerability in the app that enabled unauthorized individuals to send commands to Nissan Leaf electric vehicles without proper verification [40778]. (c) processing_unit: The failure was not attributed to a processing unit error. The root cause of the incident was a lack of authentication on the connection between the app and the vehicle systems, allowing for unauthorized commands to be sent [40778]. (d) network_communication: The software failure incident was related to network communication error. The flaw in the NissanConnect EV app allowed for non-secure access to the vehicle's telematics functions through the server, indicating a failure in network communication security [40778]. (e) embedded_software: The failure was linked to embedded software error. The vulnerability in the app's server infrastructure enabled unauthorized access to the vehicle's functions, indicating a flaw in the design or implementation of the embedded software within the app [40778].
Communication connectivity_level The software failure incident reported in Article 40778 was related to the communication layer of the cyber physical system that failed at the connectivity_level. The failure was due to contributing factors introduced by the network or transport layer. The security flaw that allowed unauthorized access to Nissan's Leaf electric vehicles through the NissanConnect EV smartphone app was a result of the connection between the remote user and the Leaf's systems not being authenticated. This lack of authentication at the network or transport layer allowed anyone with knowledge of how to send commands to do so, as Nissan's side did not verify the commands' sources [40778].
Application TRUE The software failure incident described in Article 40778 was related to the application layer of the cyber physical system. The failure was due to a security flaw in the NissanConnect EV smartphone app, which allowed unauthorized users to send random commands to Nissan Leaf electric vehicles by exploiting a non-authenticated connection between the app and the vehicles' systems. This vulnerability was caused by an issue in the dedicated server for the app, enabling unauthorized access to temperature control and other telematics functions through a non-secure route [40778].

Other Details

Category Option Rationale
Consequence property, non-human (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving Nissan's NissanConnect EV smartphone app allowed unauthorized individuals to send random commands to Nissan Leaf electric vehicles. This security flaw resulted in Nissan disabling the app to prevent further unauthorized access. As a consequence, owners of Nissan Leaf vehicles were impacted as their vehicles' security and control were compromised [40778].
Domain transportation (a) The failed system was related to the transportation industry, specifically the NissanConnect EV smartphone app used for Nissan Leaf electric vehicles [40778]. The app allowed users to control their vehicles remotely, indicating its support for transportation services.

Sources

Back to List