My other car is your car: compromising the Tesla Model X keyless entry system
DOI:
https://doi.org/10.46586/tches.v2021.i4.149-172Keywords:
Remote Keyless Entry, Passive Keyless Entry and Start, automotive security, reverse engineering, Bluetooth Low Energy, Secure ElementAbstract
This paper documents a practical security evaluation of the Tesla Model X keyless entry system. In contrast to other works, the keyless entry system analysed in this paper employs secure symmetric-key and public-key cryptographic primitives implemented by a Common Criteria certified Secure Element. We document the internal workings of this system, covering the key fob, the body control module and the pairing protocol. Additionally, we detail our reverse engineering techniques and document several security issues. The identified issues in the key fob firmware update mechanism and the key fob pairing protocol allow us to bypass all of the cryptographic security measures put in place. To demonstrate the practical impact of our research we develop a fully remote Proof-of-Concept attack that allows to gain access to the vehicle’s interior in a matter of minutes and pair a modified key fob, allowing to drive off. Our attack is not a relay attack, as our new key fob allows us to start the car anytime anywhere. Finally, we provide an analysis of the update performed by Tesla to mitigate our findings. Our work highlights how the increased complexity and connectivity of vehicular systems can result in a larger and easier to exploit attack surface.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Lennert Wouters, Benedikt Gierlichs, Bart Preneel
This work is licensed under a Creative Commons Attribution 4.0 International License.