Incident: Remote Hack of Tesla Model S Can Bus System

Published Date: 2016-09-20

Postmortem Analysis
Timeline 1. The software failure incident involving hackers taking remote control of a Tesla Model S occurred three months after the first fatal crash involving a Tesla driving in autopilot mode [47732]. 2. Published on 2016-09-20. 3. The software failure incident likely happened around June 2016.
System 1. Tesla Model S (P85, 75D, and potentially other models) 2. Controller Area Network (Can bus) [47732]
Responsible Organization 1. Hackers from Keen Security Lab - Article 47732
Impacted Organization 1. Tesla Model S drivers were impacted by the software failure incident [47732].
Software Causes 1. The software cause of the failure incident was a vulnerability in the car's controller area network (Can bus) that allowed hackers to remotely take control of various electronically controlled features in the Tesla Model S [47732].
Non-software Causes 1. The hack targeting the car's controller area network (Can bus) [47732] 2. The car needing to be connected to a malicious Wi-Fi hotspot set up by the hacking team [47732] 3. The vulnerability being triggered when the car's web browser is used [47732]
Impacts 1. The hackers were able to remotely take control of a Tesla Model S, affecting various electronically controlled features such as brakes, door locks, dashboard computer screen, and more, posing a significant safety risk to Tesla drivers [47732]. 2. By hijacking the car's Can bus, the hackers could manipulate essential functions like moving seats, triggering indicators, controlling brakes, and opening the sunroof and boot while the car was in motion, potentially endangering the occupants [47732]. 3. The vulnerability required the car to be connected to a malicious Wi-Fi hotspot, highlighting the security risks associated with internet-connected vehicles and the potential for unauthorized access and control [47732]. 4. Tesla responded by issuing a software update over-the-air to address the vulnerabilities, emphasizing the importance of prompt action in mitigating software failures that could compromise vehicle safety and security [47732].
Preventions 1. Implementing stricter access controls and authentication mechanisms for the car's web browser to prevent unauthorized access to the Can bus [47732]. 2. Conducting regular security audits and penetration testing on the car's software to identify and address potential vulnerabilities before they can be exploited by hackers [47732]. 3. Enhancing the encryption and security protocols used for communication between the car's systems to prevent interception and manipulation by malicious actors [47732].
Fixes 1. Implementing a software update delivered over-the-air by Tesla to address the vulnerabilities discovered by the Chinese security researchers [47732]. 2. Enhancing cybersecurity measures in Tesla vehicles to prevent remote hacking attacks, such as securing the car's controller area network (Can bus) and ensuring that the car is not susceptible to malicious Wi-Fi hotspots [47732]. 3. Continuing Tesla's bug bounty program to encourage other hackers to identify and report vulnerabilities in the company's software, thereby allowing for prompt fixes and improvements in security measures [47732].
References 1. Chinese security researchers - Samuel LV, Sen Nie, Ling Liu, and Wen Lu from Keen Security Lab [47732] 2. Tesla's official statement [47732] 3. University of South Carolina researchers [47732]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident has happened again at one_organization: The article mentions that this is not the first time Tesla has been hacked. Previously, a group of researchers at the University of South Carolina were able to manipulate Tesla's autopilot system. This indicates that Tesla has experienced software vulnerabilities and hacking incidents in the past [47732]. (b) The software failure incident has happened again at multiple_organization: There is no specific mention in the article about similar incidents happening at other organizations or with their products and services. Therefore, it is unknown if this particular type of software failure has occurred at multiple organizations.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The hackers were able to target the Tesla cars wirelessly and remotely by exploiting vulnerabilities in the car's controller area network (Can bus), which is a critical component designed to control various functions of the vehicle [47732]. This indicates that the failure was due to contributing factors introduced during the system development phase, where vulnerabilities in the design of the Can bus system allowed for unauthorized remote access and control of the car's features. (b) The software failure incident related to the operation phase is also highlighted in the article. The hackers were able to take remote control of a Tesla Model S by setting up a malicious Wi-Fi hotspot, which required the car to be physically near and connected to the hotspot. This operation-based failure was triggered when the car's web browser was used, allowing the hackers to exploit the system while it was in operation [47732]. This demonstrates that the failure was due to contributing factors introduced during the operation or misuse of the system, where the use of the web browser in conjunction with a malicious Wi-Fi hotspot enabled the unauthorized access and control of the vehicle.
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident described in the article is within the system. The hackers were able to target the car wirelessly and remotely by exploiting vulnerabilities in the car's controller area network (Can bus) and other electronically controlled features [47732]. The attack required the car to be connected to a malicious Wi-Fi hotspot set up by the hacking team, and it could only be triggered when the car's web browser was used. Tesla responded by creating a software update to address the vulnerabilities and deliver it over-the-air [47732]. (b) outside_system: The software failure incident is also influenced by factors outside the system. The hackers needed to set up a malicious Wi-Fi hotspot to carry out the attack, which means the vulnerability was exploited through an external network connection [47732]. This highlights the importance of considering external cybersecurity threats when assessing and addressing software vulnerabilities in high-tech connected systems like Tesla vehicles.
Nature (Human/Non-human) non-human_actions (a) The software failure incident occurring due to non-human actions: The software failure incident in the Tesla Model S occurred due to hackers remotely taking control of the car's features, such as brakes, door locks, dashboard screen, and more, from a distance of 12 miles. The hackers targeted the car's controller area network (Can bus) wirelessly and remotely, demonstrating the vulnerability in a video. This incident was a result of non-human actions, specifically the malicious actions of the hackers [47732]. (b) The software failure incident occurring due to human actions: The software failure incident involving the Tesla Model S was not directly caused by human actions but rather by the actions of hackers exploiting vulnerabilities in the car's systems. The hackers targeted the car's Can bus wirelessly and remotely, demonstrating the potential havoc they could cause for Tesla drivers. However, it was the responsible disclosure of these vulnerabilities by the Chinese security researchers to Tesla that led to the company creating a software update to address the issue. Therefore, while human actions were involved in discovering and mitigating the vulnerability, the initial software failure incident was primarily due to non-human actions [47732].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The hackers were able to target the car wirelessly and remotely by exploiting vulnerabilities in the car's controller area network (Can bus), which is a hardware component found inside every modern vehicle [47732]. - The attack required the car to be connected to a malicious Wi-Fi hotspot set up by the hacking team, indicating a hardware-related aspect of the vulnerability [47732]. (b) The software failure incident related to software: - The hackers were able to remotely interfere with various electronically controlled features of the Tesla Model S, such as brakes, door locks, dashboard computer screen, indicators, wing mirrors, windscreen wipers, sunroof, and boot, by hijacking the car's Can bus, which is a software-controlled system [47732]. - Tesla responded to the vulnerability by creating a software update that was delivered over-the-air to address the software-related issues exploited by the hackers [47732].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. Hackers were able to remotely take control of a Tesla Model S by targeting the car's controller area network (Can bus) wirelessly and interfering with various electronically controlled features, including the brakes, door locks, dashboard computer screen, and more [47732]. The hackers were able to manipulate the car's functions while it was driving, posing a serious safety risk. The attack required the car to be connected to a malicious Wi-Fi hotspot set up by the hacking team, demonstrating a deliberate intent to harm the system. Tesla responded by issuing a software update to address the vulnerabilities exploited by the hackers.
Intent (Poor/Accidental Decisions) accidental_decisions (a) The intent of the software failure incident related to poor_decisions: - The software failure incident involving the remote control of a Tesla Model S by hackers was not due to poor decisions by the security researchers who discovered the vulnerability. They acted responsibly by disclosing the vulnerabilities to Tesla [47732]. - Tesla responded quickly by creating a software update to address the vulnerabilities, showing a proactive attitude towards cybersecurity [47732]. (b) The intent of the software failure incident related to accidental_decisions: - The software failure incident could be attributed to accidental decisions made by Tesla drivers who connected their cars to a malicious Wi-Fi hotspot set up by the hacking team, triggering the vulnerability [47732]. - The incident highlights the potential risks associated with using the car's web browser in proximity to a malicious Wi-Fi hotspot, which could be considered an unintended decision leading to the software failure [47732].
Capability (Incompetence/Accidental) accidental (a) The software failure incident related to development incompetence is not explicitly mentioned in the provided article. (b) The software failure incident in the article is related to an accidental hack by Chinese security researchers from Keen Security Lab who were able to remotely take control of a Tesla Model S by targeting the car's controller area network (Can bus) wirelessly. This accidental hack allowed them to interfere with various electronically controlled features of the car, including the brakes, door locks, dashboard computer screen, indicators, wing mirrors, windscreen wipers, sunroof, and boot [47732].
Duration temporary The software failure incident described in the article was temporary. The incident was caused by hackers who were able to remotely take control of a Tesla Model S by targeting the car's controller area network (Can bus) wirelessly and triggering various electronically controlled features [47732]. The vulnerability was specific to the car being connected to a malicious Wi-Fi hotspot and using the web browser, indicating that the failure was due to certain circumstances introduced by the hackers' actions rather than a permanent flaw in the software. Tesla responded quickly by creating a software update to address the vulnerability, demonstrating that the failure was not inherent but rather a temporary issue that could be mitigated [47732].
Behaviour value, byzantine, other (a) crash: The article reports a software failure incident where hackers were able to take remote control of a Tesla Model S, interfering with various electronically controlled features such as brakes, door locks, and dashboard computer screen [47732]. (b) omission: The hackers were able to control the car's brakes, which could be dangerous if deployed suddenly while the vehicle was traveling at high speed on a motorway [47732]. (c) timing: The attack required the car to be connected to a malicious Wi-Fi hotspot set up by the hacking team, and this could only be triggered when the car's web browser was used [47732]. (d) value: The hackers were able to move the seats back and forth, trigger indicators, wing mirrors, windscreen wipers, open the sunroof and boot while the car was driving and in parking mode, indicating incorrect functioning of the software [47732]. (e) byzantine: The hackers were able to control various features of the car wirelessly and remotely, demonstrating inconsistent responses and interactions with the car's systems [47732]. (f) other: The software failure incident involved hackers targeting the car's controller area network (Can bus), which controls various functions of the vehicle, showcasing a different type of behavior not covered by the other options [47732].

IoT System Layer

Layer Option Rationale
Perception network_communication, embedded_software (a) sensor: The software failure incident reported in the article is related to the network communication layer of the cyber physical system. The hackers targeted the car's controller area network (Can bus), which is a collection of connected computers inside the vehicle that control various functions, including indicators and brakes [47732]. (d) network_communication: The software failure incident involved hackers taking remote control of a Tesla Model S by targeting the car wirelessly and remotely through a malicious Wi-Fi hotspot. The attack required the car to be connected to this hotspot, triggered when the car's web browser was used [47732]. (e) embedded_software: The vulnerability exploited by the hackers was related to the embedded software in the Tesla vehicles. The hackers were able to hijack the car's Can bus, enabling them to control various electronically controlled features, including the brakes, dashboard screen, and other functions [47732].
Communication link_level The software failure incident reported in Article 47732 was related to the communication layer of the cyber physical system that failed. The hackers targeted the car's controller area network (Can bus), which is a communication protocol that operates at the data link layer of the OSI model. By exploiting vulnerabilities in the Can bus, the hackers were able to remotely control various electronically controlled features of the Tesla vehicles, including the brakes, door locks, indicators, and more [47732]. This indicates that the failure was at the link_level, specifically at the data link layer of the communication system within the vehicles.
Application TRUE The software failure incident described in the article [47732] was related to the application layer of the cyber physical system. The hackers were able to target the Tesla Model S wirelessly and remotely by exploiting vulnerabilities in the car's controller area network (Can bus) and its web browser. They were able to manipulate various electronically controlled features of the car, including the brakes, indicators, wing mirrors, windscreen wipers, sunroof, and boot. This manipulation was possible by hijacking the car's Can bus and required the car to be connected to a malicious Wi-Fi hotspot set up by the hackers when the web browser was in use. The vulnerabilities exploited by the hackers were related to bugs and incorrect usage of the car's systems, indicating a failure at the application layer of the cyber physical system [47732].

Other Details

Category Option Rationale
Consequence property, non-human, theoretical_consequence (a) death: The software failure incident involving the Tesla Model S being hacked did not result in any reported deaths. The article mentions a previous fatal crash involving a Tesla driving in autopilot mode but does not attribute any deaths to the hacking incident itself [47732]. (b) harm: The article does not mention any physical harm caused to individuals as a direct result of the software failure incident [47732]. (c) basic: There is no indication in the article that people's access to food or shelter was impacted by the software failure incident [47732]. (d) property: The software failure incident did impact people's property, specifically their Tesla Model S cars. The hackers were able to remotely interfere with various electronically controlled features of the car, such as the brakes, door locks, dashboard computer screen, seats, indicators, wing mirrors, windscreen wipers, sunroof, and boot [47732]. (e) delay: The article does not mention any delays caused by the software failure incident [47732]. (f) non-human: The software failure incident impacted non-human entities, specifically the Tesla Model S cars that were targeted by the hackers. The hackers were able to remotely control various functions of the cars, demonstrating the vulnerability of the vehicles to cyber attacks [47732]. (g) no_consequence: The software failure incident did have observed consequences, as detailed in the article [47732]. (h) theoretical_consequence: The article discusses potential consequences of the software failure incident, such as the ability of the hackers to control the car's brakes while it was traveling at high speed on a motorway. However, Tesla stated that the risk to customers was very low, and they responded quickly by issuing a software update to address the vulnerability [47732]. (i) other: The article does not mention any other specific consequences of the software failure incident beyond those related to property damage and potential safety risks [47732].
Domain transportation (a) The failed system in this incident was related to the transportation industry, specifically affecting a Tesla Model S. The hackers were able to remotely take control of the car's electronic features, including the brakes, door locks, and dashboard computer screen, highlighting vulnerabilities in the high-tech vehicle [Article 47732]. (j) The incident also touches upon the issue of cybersecurity in the automotive industry as cars become increasingly high-tech and connected to the internet. Tesla, being a prominent player in the electric vehicle market, has been targeted by hackers in the past, emphasizing the importance of addressing cybersecurity concerns in the transportation sector [Article 47732].

Sources

Back to List