Header Ads

Unpatched Exploit Lets You Clone Key Fobs and Open Subaru Cars

Tom Wimmenhove, a Dutch electronics designer, has discovered a flaw in the key fob system used by several Subaru models, a vulnerability the vendor has not patched and could be abused to hijack cars.

The issue is that key fobs for some Subaru cars use sequential codes for locking and unlocking the vehicle, and other operations.

These codes — called rolling codes or hopping code — should be random, in order to avoid situations when an attacker discovers their sequence and uses the flaw to hijack cars.

Car thieves can create duplicate, fully-working key fobs


Wimmenhove discovered the problem by sniffing the radio signals sent out by his own car's key fob, which is nothing more than a short-range radio transmitter.

The electronics expert quickly realized that he could "clone" the key fob and create a fully-working, unauthorized duplicate.

"By receiving a single packet from the key fob (i.e. the user pressed any of the buttons on the fob while the attacker was within range), the attacker can use that packet to predict the next rolling code and use that to lock, unlock, unlock trunk or sound the alarm of the car," Wimmenhove told Bleeping Computer.

Attack rig created using off-the-shelf electronic components


The vulnerability is easy to exploit and doesn't require advanced coding skills. The cyber-criminal underworld is full of hardware hackers that could easily replicate what Wimmenhove achieved.

A car thief would need to create a simple rig that can pick up the key fob's radio signal, compute the next rolling code, and send out a similar radio signal back to the car after the owner has left.

The rig to carry out such attacks is not even expensive, varying from $15 to $30, depending on price and used components.

"Currently, I'm using a Raspberry Pi B+ ($25), a Wi-Fi dongle ($2) and a TV dongle ($8), but the Raspberry Pi B+ and WiFi dongle could both be replaced with a single Raspberry Pi Zero W ($10), which has WiFi on board," Wimmenhove told Bleeping.

"Then you need a 433MHz antenna ($1) and an MCX to SMA convertor ($1) to stick the antenna onto the dongle," he added. "Finally, you need something to power the thing. I'm assuming most people have some kind of Lithium-Ion power bank laying around. If not, they don't cost much either."

Several Subaru models affected


Wimmenhove tested the rig on his own 2009 Subaru Forester, but says the exploit should also work on the following models:

2006 Subaru Baja
2005 - 2010 Subaru Forester
2004 - 2011 Subaru Impreza
2005 - 2010 Subaru Legacy
2005 - 2010 Subaru Outback

Bleeping Computer asked the researcher to prove his work, and the following video was provided at request:

Subaru is aware but has not patched the issue


The researcher also said he reached out to Subaru about his findings.

"I did [reach out]. I told them about the vulnerability and shared my code with them," Wimmenhove told Bleeping. "They referred me to their 'partnership' page and asked me to fill in a questionnaire. It didn't seem like they really cared and I haven't heard back from them."

Subaru did not respond to three requests for comment from Bleeping Computer made over 36 hours before publication.

The code needed to run Wimmenhove's attack rig, along with instructions, are now on GitHub. Bleeping Computer is not sharing the link in this article.

No comments