Blog
June 11, 2023

From Garage to Gateway: Introduction to Assessing the Security of Automotive IoT Gateways

This article focuses on the security assessment of automotive IoT gateways, uncovering vulnerabilities and risks. Through hands-on experimentation, we explore the gateway's role in vehicle communication, analyze potential weaknesses, and evaluate the effectiveness of security measures. By addressing these security concerns, we pave the way for more robust and secure automotive IoT systems. In the realm of the automotive industry, where the rubber hits the road, so do the risks. As our vehicles become less "horseless carriage" and more "mobile IoT device," security considerations shift gears from simply keeping your physical car secure, to securing a moving piece of the Internet of Things. The roadways have become the information superhighway. So, buckle up, dear readers, because today we're diving under the hood of the automotive IoT gateway's security.

From Garage to Gateway: Introduction to Assessing the Security of Automotive IoT Gateways

Revving up: Understanding IoT Gateway Vulnerabilities

The IoT gateway serves as the main junction between your vehicle and the rest of the connected world. These tiny traffic cops route data between different networks, managing and securing the flow of information. But where there's data, there's danger.

Some of the most common vulnerabilities are outdated firmware, weak encryption, and insecure API endpoints. The trick is to remember that the weakest link in the chain defines the strength of the entire network. In the automotive context, this means the shiny infotainment system or the cutting-edge navigation tech can be the entry point for those with nefarious intentions.


Crash Test: The Risks of Compromised Gateways

Now, imagine you're cruising down the freeway when suddenly, your car's brakes apply themselves. Not an ideal situation, right? This is just a simple demonstration of the potential risks that a compromised IoT gateway can pose. From the manipulation of critical safety features to theft of personal data, a breached gateway can provide intruders access to your vehicle's control system.

A vehicle's gateway bridges the external, internet-connected devices with the internal, safety-critical systems. Therefore, when the wall between these two collapses, a malware-ridden smartphone app can be just a hop, skip, and a jump away from your car's brake system.


Zeroing In: Exploitation of Gateway Vulnerabilities

Let's add some octane to this journey by diving a bit deeper into the exploitation of these gateway vulnerabilities.

Remember our friend, the outdated firmware? This can often be exploited using what we call a "buffer overflow attack." Hackers can input an excessive amount of data into the system, causing it to 'overflow' and disrupt normal operations, possibly leading to arbitrary code execution.

An example of outdated firmware? Let's travel back in time to 2015 when Charlie Miller and Chris Valasek famously remotely hijacked a Jeep Cherokee through its infotainment system. The duo exploited a weakness in the car's infotainment system, which controls the entertainment and navigation, and enables phone calls. They rewrote the firmware on a chip in the entertainment system head unit to send commands on the vehicle's CAN bus. This allowed them to control the air conditioning, radio, windshield wipers, and even the brakes and steering under certain conditions. Chilling, isn't it?

Now, weak encryption. For a tangible example, we'll need to dip into the hypothetical given the proprietary nature of most automotive IoT systems.
Picture this: A luxury car manufacturer decides to incorporate an IoT gateway into its vehicles to connect its proprietary infotainment system with a cloud-based service. The idea is to offer real-time updates on traffic, entertainment, and software patches for the car's ECUs.
To secure this communication, the manufacturer employs encryption but, to save on costs and computational resources, opts for a deprecated encryption method, let's say DES (Data Encryption Standard) with 56-bit keys.


Now, consider a hacker with a bit of time and a powerful enough machine (or access to a botnet). With the DES encryption being weak and susceptible to brute force attacks, they could potentially crack it, gain access to the data stream, and start intercepting the communication between the car and the cloud service.

Imagine the data this hacker could access — GPS location, personal identifiers, the make and model of the car, and possibly even the downloaded firmware updates for the ECUs. With enough skill, they could manipulate the firmware update before it's installed, injecting malicious code that could, for instance, disable certain safety features or control vehicle functionalities.

For our hypothetical scenario, consider an API endpoint vulnerability. Let's say our vehicle has a smartphone app that communicates with the vehicle's IoT gateway. This app might have an API endpoint that controls the locking mechanism of the vehicle, accessible only with a unique key linked to the user's account. But imagine that the endpoint is improperly secured, allowing requests without any key.

This means that any attacker who discovers the API endpoint could send a request to unlock the vehicle. While this might not directly compromise the vehicle's operation, it can provide a springboard for additional attacks, such as physical theft or installation of hardware-based hacking tools. This highlights the importance of using strong encryption and secure coding practices for all API endpoints.

But what if our gateway is less smart and does not connect to the internet?

Let's shine a spotlight on some ways that a compromised gateway could impact these crucial CAN functionalities.
Firstly, the gateway's role in routing and forwarding packets is akin to a VLAN router, segregating and directing traffic between different CAN buses. Now, envision an attacker compromising the gateway to conduct a 'Man-in-the-Middle' (MiTM) attack. By doing so, they could intercept, alter, or reroute these packets, inducing false readings or triggering unwanted actions on the connected Electronic Control Units (ECUs). This could spread misinformation across the vehicle, causing misbehavior ranging from blinking dashboard lights to inappropriate activation of safety-critical systems.

Now, let's talk about the gateway's role in managing the UDS (Unified Diagnostic Services) security access and authentication services. Here, the gateway serves as a guardian, ensuring that only authorized personnel can access the vehicle's ECUs for diagnostics or firmware updates.
But what if this guardian is compromised?


Consider a scenario where an attacker exploits a vulnerability in the gateway's firmware. Gaining unauthorized access, they could manipulate the 0x27 (security access) and 0x29 (authentication) services, allowing them to bypass the security measures, control the I/O of the ECUs, and potentially upload malicious firmware updates. This would be similar to handing over the keys to your car's kingdom to a stranger.


The ramifications could be severe. They could range from unauthorized access to sensitive data, such as GPS location and personal identifiers, to the alteration of vehicle behavior or performance. In worst-case scenarios, it could even enable direct, remote control of safety-critical vehicle functions.

These scenarios underline the importance of seeing the automotive IoT gateway as more than just a conduit for data. As such, the robustness and reliability of its design, implementation, and regular auditing are of paramount importance to ensure the security of our increasingly connected vehicles.

In the end, it all circles back to our common advice: regular firmware updates, strong encryption, secure coding practices, and regular security audits. Because, in this race, there are no pit stops. It's a constant journey to keep our vehicles safe, secure, and cruising smoothly on the information superhighway.


Detour Ahead: Securing the Automotive IoT Gateway

While the automotive cybersecurity landscape may sometimes seem difficult to grasp, we're not stranded on the roadside just yet. By following some best practices, we can ensure that our automotive IoT gateways remain as secure as possible.
First and foremost, regular firmware updates are a must. Manufacturers regularly patch security vulnerabilities, but it’s the vehicle owners' responsibility to ensure these updates are applied.


Secondly, encryption needs to be the name of the game. This applies to data at rest, in transit, and especially at the API endpoints. Robust encryption techniques, like AES-256 or RSA-4096, can help protect the integrity and confidentiality of the data.
Finally, we have to remember that security is not a destination but a journey. Regular security audits, penetration testing, and threat modeling can keep us ahead of the curve, and hopefully, out of the hacker's rearview mirror.


In the race between security experts and cyber attackers, the finish line constantly moves. But with informed understanding, vigilance, and the right preventative measures, we can stay ahead. So let’s turn that ignition and drive toward a more secure automotive future.

Falk Mayer

Als Gründer und Geschäftsführer ist Falk der wichtigste Kontaktpunkt rund um BreachLabz – und findet sogar noch Zeit, um Nachrichten und Anfragen eigenständig zu beantworten. Probieren Sie es aus.

Bereit zum Kennenlernen? Sprechen Sie noch heute mit uns.