Incident: Insecure Software System in Mitsubishi Outlander Hybrid Cars.

Published Date: 2016-06-06

Postmortem Analysis
Timeline 1. The software failure incident involving Mitsubishi Outlander hybrid cars happened in 2016 (Published on 2016-06-06) [44856].
System 1. Mitsubishi Outlander hybrid cars' software system [44856]
Responsible Organization 1. Mitsubishi - The software failure incident in the Mitsubishi Outlander hybrid cars was caused by the insecure software system designed by Mitsubishi, which allowed hackers to remotely control various functions of the car [44856].
Impacted Organization 1. Outlander hybrid car owners [44856] 2. Mitsubishi as a company [44856]
Software Causes 1. Insecure software system design by Mitsubishi, likely due to cost-cutting measures, which allowed for vulnerabilities to be exploited by hackers [44856].
Non-software Causes 1. Lack of secure design in the car's connectivity system, using wifi instead of more secure options like GSM/web service/mobile app based solutions [44856]. 2. Cost-cutting measures by Mitsubishi in the design of the car's software system, potentially compromising security [44856]. 3. Initial disinterest from Mitsubishi in addressing the reported security vulnerability, leading to a delay in taking action [44856].
Impacts 1. The software failure incident allowed hackers to remotely turn off the car's alarm system, control the lights, and drain the battery of at least 100,000 Mitsubishi Outlander hybrid cars [Article 44856]. 2. The vulnerability in the software system of the Outlander enabled unauthorized access to the car, potentially leading to theft or misuse [Article 44856]. 3. The incident raised concerns about the overall cybersecurity of modern motor vehicles, highlighting the increasing vulnerability of connected vehicle technologies [Article 44856]. 4. Mitsubishi recommended that Outlander owners deactivate the wifi system in their cars until further notice, indicating a loss of functionality due to the software vulnerability [Article 44856].
Preventions 1. Implementing a more secure communication channel such as GSM/web service/mobile app based solution instead of using wifi to connect the car directly with a smartphone could have prevented the software failure incident [44856]. 2. Conducting thorough security testing and audits during the software development process to identify and address vulnerabilities before the product is released to the market could have prevented the software failure incident [44856]. 3. Proactively engaging with security researchers and promptly addressing reported vulnerabilities to ensure timely fixes and prevent potential exploitation by malicious actors could have prevented the software failure incident [44856].
Fixes 1. A recall of at least 100,000 Outlander hybrid cars by Mitsubishi to address the security breach that allowed hackers to remotely control various car functions [44856].
References 1. Security researchers, including Ken Munro [44856] 2. Mitsubishi representatives, including Alex Fedorak [44856] 3. Wired reporter Andy Greenberg [44856] 4. FBI [44856] 5. BBC [44856]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The software failure incident related to the security breach in Mitsubishi Outlander hybrid cars has not happened again within the same organization as per the provided article [44856]. (b) However, the article mentions previous incidents of similar vulnerabilities in other car models such as the Jeep, Nissan Leaf, and Tesla Model S, indicating that similar incidents have occurred with products from other organizations [44856].
Phase (Design/Operation) design, operation (a) The software failure incident in the Mitsubishi Outlander hybrid cars was primarily due to design factors introduced during the development phase. Security researcher Ken Munro highlighted that the car's insecure software system was likely a result of cost-cutting by Mitsubishi, opting for a less secure wifi connection method instead of a more secure GSM/web service/mobile app based solution [44856]. This design choice made the car vulnerable to hacking, allowing remote control of various functions such as disabling the alarm system and draining the battery. (b) Additionally, the software failure incident also had operational implications as users were advised to deactivate the wifi system in their Outlander cars until further notice [44856]. This recommendation indicates that the operation or use of the wifi system in the cars could potentially exacerbate the security vulnerability and lead to further exploitation by hackers.
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident in the Mitsubishi Outlander hybrid cars was primarily due to contributing factors that originated from within the system. The vulnerability that allowed hackers to remotely turn off the car's alarm system, control the lights, and drain the battery was a result of the car's insecure software system, which was likely designed to cut costs by using wifi for direct car-to-smartphone communication instead of a more secure GSM/web service/mobile app based solution [44856]. (b) outside_system: The software failure incident was also influenced by contributing factors that originated from outside the system. The increasing trend of hackers targeting modern cars with connected technologies, as highlighted by previous incidents involving other car models like the Jeep, Nissan Leaf, and Tesla Model S, indicates a broader external cybersecurity threat landscape that impacts the automotive industry [44856].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the Mitsubishi Outlander hybrid cars was primarily due to non-human actions. The vulnerability that allowed hackers to remotely control various functions of the car, such as turning off the alarm system and draining the battery, was a result of the car's insecure software system. Security researcher Ken Munro speculated that the insecure software system was likely implemented as a cost-cutting measure by Mitsubishi, choosing a less secure wifi-based connection method over a more secure GSM/web service/mobile app based solution [44856]. (b) However, human actions also played a role in this software failure incident. The security researcher, Ken Munro, discovered the vulnerability by actively investigating and hacking the Mitsubishi Outlander hybrid car. Additionally, the response from Mitsubishi initially showed disinterest when Munro attempted to disclose the vulnerability privately. It was only after Munro contacted the BBC that Mitsubishi took the matter seriously and initiated steps to address the issue [44856].
Dimension (Hardware/Software) hardware, software (a) The software failure incident in the Mitsubishi Outlander hybrid cars was primarily due to hardware-related factors. The vulnerability that allowed hackers to remotely control various functions of the car, such as turning off the alarm system and draining the battery, stemmed from the car's design choice to connect directly with a smartphone via wifi instead of using a more secure GSM/web service/mobile app-based solution [44856]. (b) The software failure incident also had contributing factors originating in software. The insecure software system in the Outlander was speculated to be a result of cost-cutting by Mitsubishi, as the design choice to use wifi for direct car-to-smartphone connection was seen as a cheaper alternative to a more secure GSM/web service/mobile app-based solution. This software design flaw made the car vulnerable to hacking and remote control by malicious actors [44856].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in the Mitsubishi Outlander hybrid cars can be categorized as malicious. Security researchers discovered a vulnerability that allowed hackers to remotely turn off the car's alarm system, control the lights, drain the battery, and even easily geolocate and track the car. The security expert leading the investigation, Ken Munro, highlighted that the insecure software system in the car was likely a result of cost-cutting by Mitsubishi, making it vulnerable to hacking attempts [44856]. The incident raises concerns about the potential for malicious actors to exploit such vulnerabilities in connected vehicles for nefarious purposes.
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident: The software failure incident involving Mitsubishi Outlander hybrid cars was primarily due to poor decisions made by Mitsubishi in designing the car's software system. Security researcher Ken Munro speculated that the insecure software system was likely a result of cost-cutting measures by Mitsubishi. By opting for a less secure wifi-based connection instead of a more secure GSM/web service/mobile app based solution, Mitsubishi exposed the cars to vulnerabilities that allowed hackers to remotely control various functions of the vehicle, including disabling the alarm system and draining the battery [44856]. Additionally, when Munro reached out to Mitsubishi to disclose the security vulnerability, the initial attempts were met with disinterest from the company. This lack of proactive response from Mitsubishi to address the security flaw in their software system further highlights the poor decisions made in handling the situation [44856].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident in the Mitsubishi Outlander hybrid cars was primarily attributed to development incompetence. Security researcher Ken Munro speculated that the insecure software system in the car was likely a result of cost-cutting measures by Mitsubishi. Munro mentioned that the design choice to use wifi for direct car-to-smartphone communication instead of a more secure GSM/web service/mobile app based solution was likely made to reduce costs for Mitsubishi, but it introduced significant vulnerabilities that allowed hackers to remotely control various functions of the car [44856]. (b) Additionally, the incident could also be considered accidental as it was not intentional for Mitsubishi to have such vulnerabilities in their software system. The lack of awareness or consideration of potential cybersecurity threats in the design and development process may have led to the accidental introduction of exploitable weaknesses in the car's software [44856].
Duration temporary The software failure incident in the Mitsubishi Outlander hybrid cars can be considered as a temporary failure. This is evident from the fact that the security breach allowed hackers to remotely turn off the car’s alarm system, control the lights, and drain the battery [Article 44856]. However, Mitsubishi responded by recommending Outlander owners deactivate the wifi system until further notice, indicating that the issue is being addressed and temporary measures are being taken to mitigate the vulnerability.
Behaviour crash, omission, value, other (a) crash: The software failure incident in the Mitsubishi Outlander hybrid cars allowed hackers to remotely turn off the car’s alarm system, control the lights, and drain the battery, indicating a crash in the system where it lost control and did not perform its intended functions [44856]. (b) omission: The vulnerability in the Outlander's software system allowed the hackers to disable the alarm and open the car, indicating an omission in the system's intended functions where it failed to prevent unauthorized access [44856]. (c) timing: There is no specific mention of a timing-related failure in the articles. (d) value: The software failure incident allowed the hackers to easily geolocate a car and track it, indicating a value-related failure where the system performed its intended functions incorrectly by providing unauthorized access to sensitive information [44856]. (e) byzantine: The articles do not mention any inconsistent responses or interactions in the software failure incident. (f) other: The software failure incident also highlighted a potential ethical dilemma when the security researchers' attempts to disclose the vulnerability privately to Mitsubishi were met with disinterest, leading to a situation where public disclosure became necessary [44856].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, non-human, theoretical_consequence, other (a) death: People lost their lives due to the software failure - No information in the provided article suggests that people lost their lives due to the software failure incident. [44856] (b) harm: People were physically harmed due to the software failure - There is no mention of people being physically harmed due to the software failure incident. [44856] (c) basic: People's access to food or shelter was impacted because of the software failure - The article does not mention any impact on people's access to food or shelter due to the software failure incident. [44856] (d) property: People's material goods, money, or data were impacted due to the software failure - The software failure incident allowed hackers to remotely turn off the car’s alarm system, control the lights, and drain the battery of Mitsubishi Outlander hybrid cars. This could be considered an impact on people's property (their vehicles). [44856] (e) delay: People had to postpone an activity due to the software failure - There is no mention of people having to postpone an activity due to the software failure incident. [44856] (f) non-human: Non-human entities were impacted due to the software failure - The software failure incident affected the security and control of Mitsubishi Outlander hybrid cars, which are non-human entities. [44856] (g) no_consequence: There were no real observed consequences of the software failure - The software failure incident had observable consequences, such as hackers being able to control various functions of the Mitsubishi Outlander hybrid cars. [44856] (h) theoretical_consequence: There were potential consequences discussed of the software failure that did not occur - The article discusses potential consequences of the software failure, such as the ability for hackers to locate and track cars, but it does not mention these consequences actually occurring. [44856] (i) other: Was there consequence(s) of the software failure not described in the (a to h) options? What is the other consequence(s)? - The software failure incident could potentially lead to unauthorized access to and control of the affected vehicles, posing a risk to the safety and security of the vehicle owners. This aspect of compromised safety could be considered as another consequence of the software failure incident. [44856]
Domain transportation (a) The software failure incident reported in the articles is related to the transportation industry. The incident involved security vulnerabilities in Mitsubishi Outlander hybrid cars that allowed hackers to remotely control various functions of the vehicle, such as turning off the alarm system and draining the battery [Article 44856]. The vulnerability was discovered by security researchers who were able to exploit the car's insecure software system, highlighting the importance of cybersecurity in modern connected vehicles. The potential impact of such vulnerabilities on the transportation industry's safety and security is significant, as demonstrated by previous hacks on vehicles like Jeep, Nissan Leaf, and Tesla Model S [Article 44856]. Mitsubishi has recommended that Outlander owners deactivate the wifi system in their cars until further notice, indicating the urgency of addressing the software failure in the transportation sector.

Sources

Back to List