Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create Automotive_Security.md #1545

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

paragbagul111
Copy link
Contributor

@paragbagul111 paragbagul111 commented Nov 19, 2024

New Cheatsheet For Automotive Security Vulnerabilities

1. Weak Vehicle Communication Protocols

Vulnerability: Many vehicles use communication protocols like CAN (Controller Area Network) without adequate security measures.

Example: An attacker could intercept messages on the CAN bus, leading to unauthorized commands being sent to critical vehicle systems (e.g., brakes, steering).

Attack Surface: In-vehicle networks and any exposed diagnostic ports.

2. Insecure Over-the-Air (OTA) Updates

Vulnerability: OTA updates may lack proper authentication and encryption, allowing attackers to inject malicious firmware.

Example: An attacker could spoof an update server and deliver a malicious update that compromises the vehicle's control systems.

Attack Surface: Wireless communication channels, including cellular and Wi-Fi.

3. Insecure Telematics Systems

Vulnerability: Telematics units that connect vehicles to cloud services may have insufficient security controls.

Example: An attacker exploiting weak API security could access sensitive vehicle data or manipulate vehicle settings remotely.

Attack Surface: Cloud interfaces, telematics gateways, and mobile applications.

4. Software Supply Chain Vulnerabilities

Vulnerability: Third-party software components may have known vulnerabilities that can be exploited.

Example: If a vehicle’s infotainment system relies on a vulnerable third-party library, an attacker could exploit that vulnerability to execute arbitrary code.

Attack Surface: Infotainment systems, vehicle software updates, and any integrated third-party applications.

5. Physical Access Exploits

Vulnerability: Physical access to the vehicle can allow attackers to manipulate systems directly.

Example: An attacker with physical access could connect a malicious device to the OBD-II port to alter vehicle settings or firmware.

Attack Surface: Diagnostic ports, service stations, and unsecured vehicle access.

6. Inadequate Access Control Mechanisms

Vulnerability: Weak or poorly implemented access control measures can allow unauthorized access to vehicle systems.

Example: A driver might gain unauthorized access to administrative functions through a poorly secured mobile app.

Attack Surface: Mobile applications, vehicle interfaces, and internal network connections.

7. Poorly Implemented Authentication Mechanisms

Vulnerability: Many automotive systems use weak authentication methods, making it easier for attackers to gain unauthorized access.

Example: If a vehicle’s mobile app uses easily guessable passwords, an attacker could log in and change vehicle settings or track location.

Attack Surface: Mobile applications, web interfaces, and vehicle systems that allow remote access.

8. Data Leakage and Privacy Violations

Vulnerability: Vehicles often collect extensive data, which can be inadequately protected.

Example: An unsecured data transmission channel could expose sensitive user data, such as location history and personal preferences, to eavesdroppers.

Attack Surface: Data transmission channels, cloud storage, and interfaces with third-party services.

9. Lack of Security in Integrated Systems

Vulnerability: The integration of various systems (e.g., infotainment, navigation) can create vulnerabilities if not properly secured.

Example: An attacker could exploit a vulnerability in the infotainment system to gain access to the vehicle’s control systems through interconnected components.

Attack Surface: Interconnected vehicle systems, APIs, and communication channels between systems.

10. Insecure Legacy Systems

Vulnerability: Many vehicles still use legacy systems with outdated security protocols.

Example: An attacker could exploit known vulnerabilities in older vehicle models that have not been patched, gaining control over critical systems.

Attack Surface: Older vehicle models, diagnostic tools, and maintenance interfaces.

New Cheatsheet For Automotive Security Vulnerabilities
@jmanico
Copy link
Member

jmanico commented Nov 19, 2024

This is great. For starters can you fix the markdown?

cheatsheets/Automotive_Security.md:13 MD012/no-multiple-blanks Multiple consecutive blank lines [Expected: 1; Actual: 2]
cheatsheets/Automotive_Security.md:22 MD012/no-multiple-blanks Multiple consecutive blank lines [Expected: 1; Actual: 2]

@paragbagul111
Copy link
Contributor Author

Done

@mackowski mackowski requested review from jmanico and szh November 25, 2024 16:34
Copy link
Collaborator

@szh szh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, it's hard for me to review since I have no experience in the automotive industry... let me see if I can find someone with domain knowledge to review.

@kwwall
Copy link
Collaborator

kwwall commented Nov 26, 2024

I agree with @szh; I think we need some supporting documentation here. Most of these seem intuitive based on my general AppSec knowledge, but I still think we need some reliable references because it's OWASP's reputation that is at stake here and I wouldn't want someone from the auto industry to tell us we're way off base and the important things are actually X, Y, or Z instead.

@jmanico
Copy link
Member

jmanico commented Nov 28, 2024

This is an excellent cheatsheet overall, I approve of it, but would like to see an automotive expert review it and the markdown fixed.

@mackowski
Copy link
Collaborator

@paragbagul111 based on what you determined this top 10? Is there any other presentation/whitepaper/research/reports that back this up?

@mackowski
Copy link
Collaborator

@paragbagul111 please let us know based on what you determined this top 10? Is there any other presentation/whitepapers/research/reports that back this up?

@paragbagul111
Copy link
Contributor Author

Hi @jmanico

I used the following resources to determine the top 10 security vulnerabilities for the automotive:

  1. Weak Vehicle Communication Protocols

https://www.researchgate.net/publication/354346513_Security_on_in-vehicle_communication_protocols_Issues_challenges_and_future_research_directions

  1. Insecure Over-the-Air (OTA) Updates

https://youtu.be/tcp7i51KqrM?si=540X2KUavJXYBpka

  1. Insecure Telematics Systems

https://ieeecs-media.computer.org/media/technical-activities/CYBSI/docs/CSD-telematics.pdf

  1. Software Supply Chain Vulnerabilities

https://www.seqrite.com/blog/automotive-supply-chain-cybersecurity-challenges-and-solutions/

  1. Physical Access Exploits

https://autocrypt.io/trends-in-vehicle-vulnerabilities-2023-report/

6.Inadequate Access Control Mechanisms

Check Vehicle theft section : https://www.trustonic.com/opinion/top-10-security-challenges-for-connected-cars/

7.Poorly Implemented Authentication Mechanisms

https://cydrill.com/cyber-security/the-unlikely-ecu-killer-broken-authentication-in-automotive-security/

8.Data Leakage and Privacy Violations

https://amlegals.com/data-privacy-concerns-in-the-automotive-industry/#:~:text=When%20smart%20vehicles%20connect%20to,of%20data%20breaches%20and%20hacking.

9.Lack of Security in Integrated Systems

check Connection risks section : https://www.trustonic.com/opinion/top-10-security-challenges-for-connected-cars/

10.Insecure Legacy Systems

check Lack of 'designed-in' security : https://www.trustonic.com/opinion/top-10-security-challenges-for-connected-cars/

@jmanico
Copy link
Member

jmanico commented Dec 19, 2024

I really like the idea of this cheatsheet. @mackowski are you ok with this?

@mackowski
Copy link
Collaborator

What about changing name and wording from top 10 to just 'Automotive Security Vulnerabilities' and 'Common Automotive Security Vulnerabilities' and remove numbers from the list? That will start a good cheatsheets for automotive but I think that we do not have data to call it TOP 10 or to try to put them in order.

@mackowski
Copy link
Collaborator

And when we release it I hope more experts will start making PRs and contribute to this work

@szh
Copy link
Collaborator

szh commented Dec 20, 2024

What about changing name and wording from top 10 to just 'Automotive Security Vulnerabilities' and 'Common Automotive Security Vulnerabilities' and remove numbers from the list? That will start a good cheatsheets for automotive but I think that we do not have data to call it TOP 10 or to try to put them in order.

I was thinking the same thing.

@jmanico
Copy link
Member

jmanico commented Dec 20, 2024 via email

@kwwall
Copy link
Collaborator

kwwall commented Dec 23, 2024

@paragbagul111 - In #1545 (comment), you provided refererences, but I think that information should really be included as a list of references in this newly proposed cheat sheet that's part of the PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants