-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create Automotive_Security.md #1545
base: master
Are you sure you want to change the base?
Conversation
New Cheatsheet For Automotive Security Vulnerabilities
This is great. For starters can you fix the markdown? cheatsheets/Automotive_Security.md:13 MD012/no-multiple-blanks Multiple consecutive blank lines [Expected: 1; Actual: 2] |
Lint Error Fixed
Done |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm, it's hard for me to review since I have no experience in the automotive industry... let me see if I can find someone with domain knowledge to review.
I agree with @szh; I think we need some supporting documentation here. Most of these seem intuitive based on my general AppSec knowledge, but I still think we need some reliable references because it's OWASP's reputation that is at stake here and I wouldn't want someone from the auto industry to tell us we're way off base and the important things are actually X, Y, or Z instead. |
This is an excellent cheatsheet overall, I approve of it, but would like to see an automotive expert review it and the markdown fixed. |
@paragbagul111 based on what you determined this top 10? Is there any other presentation/whitepaper/research/reports that back this up? |
@paragbagul111 please let us know based on what you determined this top 10? Is there any other presentation/whitepapers/research/reports that back this up? |
Hi @jmanico I used the following resources to determine the top 10 security vulnerabilities for the automotive:
https://youtu.be/tcp7i51KqrM?si=540X2KUavJXYBpka
https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/CSD-telematics.pdf
https://www.seqrite.com/blog/automotive-supply-chain-cybersecurity-challenges-and-solutions/
https://autocrypt.io/trends-in-vehicle-vulnerabilities-2023-report/ 6.Inadequate Access Control Mechanisms Check Vehicle theft section : https://www.trustonic.com/opinion/top-10-security-challenges-for-connected-cars/ 7.Poorly Implemented Authentication Mechanisms 8.Data Leakage and Privacy Violations 9.Lack of Security in Integrated Systems check Connection risks section : https://www.trustonic.com/opinion/top-10-security-challenges-for-connected-cars/ 10.Insecure Legacy Systems check Lack of 'designed-in' security : https://www.trustonic.com/opinion/top-10-security-challenges-for-connected-cars/ |
I really like the idea of this cheatsheet. @mackowski are you ok with this? |
What about changing name and wording from top 10 to just 'Automotive Security Vulnerabilities' and 'Common Automotive Security Vulnerabilities' and remove numbers from the list? That will start a good cheatsheets for automotive but I think that we do not have data to call it TOP 10 or to try to put them in order. |
And when we release it I hope more experts will start making PRs and contribute to this work |
I was thinking the same thing. |
Good call, Shlomo.
|
@paragbagul111 - In #1545 (comment), you provided refererences, but I think that information should really be included as a list of references in this newly proposed cheat sheet that's part of the PR. |
New Cheatsheet For Automotive Security Vulnerabilities
1. Weak Vehicle Communication Protocols
Vulnerability: Many vehicles use communication protocols like CAN (Controller Area Network) without adequate security measures.
Example: An attacker could intercept messages on the CAN bus, leading to unauthorized commands being sent to critical vehicle systems (e.g., brakes, steering).
Attack Surface: In-vehicle networks and any exposed diagnostic ports.
2. Insecure Over-the-Air (OTA) Updates
Vulnerability: OTA updates may lack proper authentication and encryption, allowing attackers to inject malicious firmware.
Example: An attacker could spoof an update server and deliver a malicious update that compromises the vehicle's control systems.
Attack Surface: Wireless communication channels, including cellular and Wi-Fi.
3. Insecure Telematics Systems
Vulnerability: Telematics units that connect vehicles to cloud services may have insufficient security controls.
Example: An attacker exploiting weak API security could access sensitive vehicle data or manipulate vehicle settings remotely.
Attack Surface: Cloud interfaces, telematics gateways, and mobile applications.
4. Software Supply Chain Vulnerabilities
Vulnerability: Third-party software components may have known vulnerabilities that can be exploited.
Example: If a vehicle’s infotainment system relies on a vulnerable third-party library, an attacker could exploit that vulnerability to execute arbitrary code.
Attack Surface: Infotainment systems, vehicle software updates, and any integrated third-party applications.
5. Physical Access Exploits
Vulnerability: Physical access to the vehicle can allow attackers to manipulate systems directly.
Example: An attacker with physical access could connect a malicious device to the OBD-II port to alter vehicle settings or firmware.
Attack Surface: Diagnostic ports, service stations, and unsecured vehicle access.
6. Inadequate Access Control Mechanisms
Vulnerability: Weak or poorly implemented access control measures can allow unauthorized access to vehicle systems.
Example: A driver might gain unauthorized access to administrative functions through a poorly secured mobile app.
Attack Surface: Mobile applications, vehicle interfaces, and internal network connections.
7. Poorly Implemented Authentication Mechanisms
Vulnerability: Many automotive systems use weak authentication methods, making it easier for attackers to gain unauthorized access.
Example: If a vehicle’s mobile app uses easily guessable passwords, an attacker could log in and change vehicle settings or track location.
Attack Surface: Mobile applications, web interfaces, and vehicle systems that allow remote access.
8. Data Leakage and Privacy Violations
Vulnerability: Vehicles often collect extensive data, which can be inadequately protected.
Example: An unsecured data transmission channel could expose sensitive user data, such as location history and personal preferences, to eavesdroppers.
Attack Surface: Data transmission channels, cloud storage, and interfaces with third-party services.
9. Lack of Security in Integrated Systems
Vulnerability: The integration of various systems (e.g., infotainment, navigation) can create vulnerabilities if not properly secured.
Example: An attacker could exploit a vulnerability in the infotainment system to gain access to the vehicle’s control systems through interconnected components.
Attack Surface: Interconnected vehicle systems, APIs, and communication channels between systems.
10. Insecure Legacy Systems
Vulnerability: Many vehicles still use legacy systems with outdated security protocols.
Example: An attacker could exploit known vulnerabilities in older vehicle models that have not been patched, gaining control over critical systems.
Attack Surface: Older vehicle models, diagnostic tools, and maintenance interfaces.