• Send Us A Tip
  • Calling all Tech Writers
  • Advertise
Thursday, January 23, 2025
  • Login
  • Register
TechStory
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to
No Result
View All Result
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to
No Result
View All Result
TechStory
No Result
View All Result
Home Future Tech Internet of Things

Massive Security Vulnerability in Subaru’s STARLINK System Exposed by Ethical Hackers

by Samir Gautam
January 23, 2025
in Internet of Things, News, Tech
Reading Time: 3 mins read
0
TwitterWhatsappLinkedin

On November 20, 2024, cybersecurity researchers Shubham Shah and his colleague uncovered a critical vulnerability in Subaru’s STARLINK-connected vehicle service. The discovery was made through systematic testing and analysis of Subaru’s online systems, during which the researchers identified an improperly secured endpoint, allowing unauthorized access to sensitive vehicle functions and customer data. This vulnerability provided unrestricted targeted access to vehicles and customer accounts in the United States, Canada, and Japan. The exploit required minimal information, such as the victim’s last name, ZIP code, email address, phone number, or license plate.

You might also like

The Last of Us Part III: A Potential PlayStation 6 Launch Title?

Uber and Ola Receive Notices from Consumer Ministry Over Differential Pricing Based on Smartphone Type

UK Inheritance Tax Revenue Surges to All-Time High Amid Threshold Freeze

Potential Exploits of the Vulnerability

Using the vulnerability, a malicious actor could have:

  • Remotely started, stopped, locked, and unlocked any vehicle by exploiting Subaru’s backend systems. The system’s lack of robust validation checks allowed unauthorized commands to be issued remotely, making vehicle control accessible with minimal information. This highlights the critical importance of secure authentication protocols in preventing unauthorized access to connected systems.
  • Retrieved real-time vehicle locations and a year’s worth of location history with pinpoint accuracy.
  • Accessed sensitive customer data, including personally identifiable information (PII), emergency contacts, billing details, and vehicle PINs.
  • Extracted additional data, such as support call history, odometer readings, and previous ownership details.

Thankfully, the issue was patched within 24 hours of being reported, and there is no evidence that the vulnerability was exploited maliciously.

Location Point Neighborhood Chart and Plot
Sam Curry and Shubham Shah accessed a year’s worth of location data for Curry’s mother’s 2023 Subaru Impreza through Subaru’s employee admin portal, exploiting its security weaknesses. Screenshot Credit Sam Curry.

Proof of Concept: A Demonstration of the Exploit

The researchers provided a chilling proof of concept, demonstrating how an attacker could take control of a Subaru vehicle using just its license plate in under 10 seconds. This was possible because the license plate information served as a unique identifier that could be used to query Subaru’s backend systems without requiring further authentication. By exploiting this design flaw, attackers could gain access to sensitive vehicle controls and data with minimal effort. They also showcased the retrieval of over a year’s worth of location data from a 2023 Subaru Impreza.

Unveiling the Flaw: A Step-by-Step Breakdown

Initial Testing on the MySubaru Mobile App

The researchers began by auditing the MySubaru app, which allows users to send vehicle commands. Using tools like Burp Suite, they intercepted HTTP requests but found no immediate vulnerabilities. The app’s endpoints were secured, and authorization was robust. Realizing the app wasn’t the weakest link, they shifted their focus to other Subaru-related online systems.

Discovering the STARLINK Admin Panel

With the help of Shubham’s colleague, Shrubs, they identified a promising domain: portal.prod.subarucs.com, which appeared to be the STARLINK admin panel. Through a combination of directory brute-forcing and examining JavaScript files, they discovered an endpoint vulnerability resulting from improper input validation and a lack of token-based confirmation checks. This oversight in development allowed the resetting of employee passwords without requiring an additional layer of authentication, leaving the system vulnerable to attacks. To prevent such flaws, developers must implement rigorous validation processes, ensure the use of secure confirmation mechanisms like time-limited tokens, and regularly audit endpoints for potential misconfigurations.

Exploiting the Password Reset Endpoint

The vulnerability in the password reset system allowed the researchers to take over any employee account, provided they had the corresponding email address. By enumerating employee emails using LinkedIn and a Subaru email pattern ([first_initial][last]@subaru.com), they identified an active user. Using the password reset functionality, they successfully took control of an account.

Circumventing Two-Factor Authentication

Although the researchers gained access to an employee’s account, they encountered a custom two-factor authentication (2FA) system. They began testing methods to bypass it, though their report did not disclose the details of further exploitation.

Immediate Response by Subaru

Upon receiving the report from Shah and Shubs, Subaru’s security team acted swiftly, patching the vulnerability within 24 hours. Subaru issued a statement thanking the researchers for their responsible disclosure and ensuring customers that the vulnerability had not been exploited maliciously.

Broader Implications

This incident highlights the critical need for robust security in connected vehicle services, underscoring the necessity for industry-wide measures like advanced threat modeling, routine system audits, and adopting secure-by-design principles. Such proactive approaches can prevent similar vulnerabilities and ensure a safer ecosystem for connected vehicles. The rise of smart vehicles introduces new attack surfaces, making it imperative for automakers to regularly audit and test their systems for vulnerabilities. Ethical hackers play a crucial role in identifying flaws before malicious actors can exploit them.

Tags: SpaceX StarlinkStarlink
Tweet54SendShare15
Previous Post

Tesla to Raise Car Prices in Canada Starting February 1, 2025

Samir Gautam

Recommended For You

The Last of Us Part III: A Potential PlayStation 6 Launch Title?

by Samir Gautam
January 23, 2025
0
The Last of Us Part III: A Potential PlayStation 6 Launch Title?

Fans of the critically acclaimed The Last of Us series have been eagerly awaiting news of a third installment, and recent rumors suggest that their hopes may soon...

Read more

Uber and Ola Receive Notices from Consumer Ministry Over Differential Pricing Based on Smartphone Type

by Rounak Majumdar
January 23, 2025
0
Uber and Ola Receive Notices from Consumer Ministry Over Differential Pricing Based on Smartphone Type

The Ministry of Consumer Affairs has taken a major step by sending complaints to Uber and Ola, two of the biggest ride-hailing companies, regarding claims that they charge...

Read more

UK Inheritance Tax Revenue Surges to All-Time High Amid Threshold Freeze

by Anwesha Datta
January 23, 2025
0
BILL MACHINE

The UK Treasury is reaping the rewards of a record-breaking surge in inheritance tax (IHT) receipts, thanks to a prolonged freeze on tax thresholds. Families across the nation...

Read more
Please login to join discussion

Related News

GTA6

GTA 6 Police Chase Leak Reveals Stunning Realism and Advanced Gameplay Features

January 19, 2025
Microsoft’s Latest Tactic: Making Bing Look Like Google?

Microsoft’s Latest Tactic: Making Bing Look Like Google?

January 7, 2025
Trump Coins

How to buy Trump Coin?

January 20, 2025
(Minister of National Security, Raymond Blackmoore at the heart of alleged corruption)

Dominica: A Dangerous Land for Justice and Foreigners

January 16, 2025
10 Best AppValley Alternatives – Similar Apps like AppValley

HDO Box App on PC (Windows 11/10/8.1 & Mac) with Nox player

October 4, 2022 - Updated On January 15, 2024
How To Beat Riddle School 5

How To Beat Riddle School 5

May 18, 2023 - Updated On November 12, 2024

Techstory

Tech and Business News from around the world. Follow along for latest in the world of Tech, AI, Crypto, EVs, Business Personalities and more.
reach us at [email protected]

Advertise With Us

Reach out at - [email protected]

BROWSE BY TAG

#Crypto #howto 2024 acquisition AI amazon Apple bitcoin Business China cryptocurrency e-commerce electric vehicles Elon Musk Ethereum facebook flipkart funding Gaming Google India Instagram Investment ios iPhone IPO Market Markets Meta Microsoft News NFT samsung Social Media SpaceX startup startups tech technology Tesla TikTok trend trending twitter US

© 2024 Techstory.in

No Result
View All Result
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to

© 2024 Techstory.in

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?