Hyundai Blue Link Vulnerability Allows Remote Start of Cars

Car maker Hyundai patched a vulnerability in its Blue Link software, which could potentially allow attackers to remotely unlock a vehicle and start it.

Dark Reading Staff, Dark Reading

April 26, 2017

1 Min Read
Dark Reading logo in a gray background | Dark Reading

A vulnerability discovered in Hyundai Motor's Blue Link app software could potentially allow cyberattackers to gain control of the vehicle, according to security researchers at Rapid7.

Hyundai, the latest car maker to be hit with a vulnerability in its connected car software, has since patched the vulnerability after receiving notice from Rapid7. No known compromises have occurred because of the flaw, Hyundai Motor America and Rapid7 noted in a statement.

The car maker's Blue Link application software version 3.9.4, which was released Dec. 8, and its version 3.9.5 could allow an attacker to exploit the vulnerability over an insecure WiFi connection, or man-in-the-middle attack.

Once exploited, an attacker could capture usernames, passwords, and PINs, then remotely locate the Hyundai vehicle, unlock it, and then start its engine, Rapid7 noted in its report. The car maker is not alone with its connected software problems. In 2015, Fiat Chrysler recalled 1.4 million vehicles that had its UConnect Infotainment systems, after it was discovered attackers could remotely take control of the vehicles' steering and braking.

Read more about Hyundai's Blue Link vulnerability here.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights