Security researchers demonstrated that cybercriminals could have exploited these vulnerabilities to remotely take control of a vehicle.

On September 20, 2024, four cybersecurity researchers published a report on critical vulnerabilities that could have led to the hacking of millions of Kia vehicles. Sam Curry, Neiko Rivera, Justin Rhinehart, and Ian Carroll identified several flaws on a website intended for owners of the Korean automaker’s vehicles.

By exploiting these vulnerabilities, the four researchers managed to compromise the website’s infrastructure and obtain a fraudulent authentication token. ‘The HTTP response contained the vehicle owner’s name, phone number, and email address. We were able to authenticate on the dealer portal using our usual credentials,’ they wrote.

This access could have allowed a cybercriminal to replace the customer’s email address and, in Kia’s eyes, become the legitimate owner of the car. They would only need to enter the vehicle’s registration number to take control of it. Several critical features would then have been available: unlocking, starting, or tracking the vehicle.

The researchers reported the flaws to Kia on June 11, 2024, and the automaker released a fix in mid-August 2024. Kia stated that they had not detected any exploitation of these vulnerabilities that led to the takeover of a vehicle.

Security researchers have shown that cybercriminals could have exploited these flaws to remotely take control of a vehicle.

Stay tuned in real time
Subscribe to
the newsletter
By providing your email address you agree to receive the Incyber newsletter and you have read our privacy policy. You can unsubscribe at any time by clicking on the unsubscribe link in all our emails.
Stay tuned in real time
Subscribe to
the newsletter
By providing your email address you agree to receive the Incyber newsletter and you have read our privacy policy. You can unsubscribe at any time by clicking on the unsubscribe link in all our emails.