Quantcast
Jump to content
  • Join the TowForce community.

    It looks like you're not logged in. Register to get started and to receive Tower Down Notices.

GPS in Cars Can Be Hacked


TowForce

Recommended Posts

July 24, 2022 by Lynn Walford "Writer/Editor of Tech, Automotive, Cars, Wireless"

 

BitSight announced today the discovery of six severe vulnerabilities in the MiCODUS MV720 GPS Tracker, a popular vehicle GPS tracker made in¬†China¬†and used worldwide by consumers for theft protection and location management, and by organizations for vehicle fleet management. If exploited in an attack, threat actors could not only access and control the tracker ‚Äď they could potentially cut off fuel, physically stop vehicles, or surveil movement of vehicles in which the device is installed.

 

MiCODUS is a Shenzhen, China-based manufacturer and supplier of automotive electronics and accessories which has 1.5 million GPS tracking devices in use today across 420,000 customers, including  government, military, law enforcement agencies, and Fortune 1000 companies. The MiCODUS MV720 is a hardwired GPS tracker that offers anti-theft, fuel cut off, remote control and geofencing capabilities.

 

BitSight’s research revealed MiCODUS devices deployed worldwide by individual consumers; government, military, and law enforcement agencies; and corporations spanning a variety of industries such as aerospace, energy, engineering, manufacturing, shipping, and more. Given the impact and severity of the vulnerabilities found, BitSight recommends users immediately cease using or disable any MiCODUS MV720 GPS trackers until a fix is made available by the company as there is no known workaround.

 

‚ÄúIf China can remotely control vehicles in¬†the United States, we have a problem,‚ÄĚ said¬†Richard Clarke, internationally renowned national security expert and former presidential advisor on cybersecurity. ‚ÄúWith the fast growth in adoption of mobile devices and the desire for our society to be more connected, it is easy to overlook the fact that GPS tracking devices such as these can greatly increase cyber risk if they are not built with security in mind. BitSight‚Äôs research findings highlight how having secure IoT infrastructure is even more critical when these vulnerabilities can easily be exploited to impact our personal safety and national security, and lead to extreme outcomes such as large-scale fleet management interruption and even loss of life.‚ÄĚ

 

Through its research, BitSight discovered six vulnerabilities in the widely used GPS device. BitSight shared its research with the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) when its vulnerability disclosure efforts to MiCODUS were disregarded. BitSight and CISA determined that these vulnerabilities require disclosure. Such action provides organizations and users of this device with the information they need to proactively protect themselves. As a result, CISA, in collaboration with BitSight, has issued a public advisory detailing the notable Common Vulnerabilities and Exposures (CVEs) that were discovered: CVE-2022-2107; CVE-2022-2141; CVE-2022-2199; CVE-2022-34150; and CVE-2022-33944.

 

‚ÄúThe vulnerabilities discovered by BitSight can directly impact our physical world, potentially resulting in disastrous consequences for individuals and organizations if not addressed,‚ÄĚ said BitSight CEO¬†Stephen Harvey. ‚ÄúOur research highlights why it is critical for organizations to consider Internet of Things (IoT) devices in cyber resilience efforts. Implementing Internet-connected devices like the MiCODUS GPS trackers can expand an organization‚Äôs attack surface and expose individual consumers to new risks. Understanding how IoT and other technologies can increase the potential to disrupt business continuity, damage a firm‚Äôs reputation, and threaten human safety should be considered essential.‚ÄĚ

 

Some of the more severe attack scenarios at risk upon the potential exploitation of these vulnerabilities, which earned as high as a 9.8 CVSS score, include:

  • Remotely cutting off the fuel line of a vehicle that is in motion;
  • Gaining access to vehicle location information, user routes, geofences and real-time location tracking for surveillance purposes; and
  • Monitoring and controlling all communications to and from the GPS tracker, including intentionally issuing incorrect vehicle location information to the GPS server.

‚ÄúThe vulnerabilities we discovered affecting the MiCODUS MV720 would allow for many possible attack scenarios where a bad actor could easily gain complete control over any GPS tracker of this type,‚ÄĚ concluded Pedro Umbelino, principal security researcher at BitSight. ‚ÄúUnfortunately, these vulnerabilities are not difficult to exploit. For example, we discovered that the web interface and mobile app share the same default password, and the GPS tracker has commands that will work even without a password. Basic flaws in this vendor‚Äôs overall system architecture raise significant questions about the vulnerability of other models.‚ÄĚ

 

RESOURCE LINK

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

√ó
√ó
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

Please Sign In or Sign Up