Smart Buses flaws expose vehicles to tracking, control, and spying
研究揭示智能公交车系统存在严重漏洞,黑客可利用这些漏洞进行追踪、控制和间谍活动。研究人员发现M2M路由器同时管理Wi-Fi和关键车载系统,导致网络分割缺失。攻击者可绕过认证,窃取数据并操控车辆功能。尽管已向制造商报告问题,但漏洞仍未修复。 2025-8-11 08:40:53 Author: securityaffairs.com(查看原文) 阅读量:11 收藏

Smart Buses flaws expose vehicles to tracking, control, and spying

Researchers showed how hackers can exploit flaws in a bus’ onboard and remote systems for tracking, control and spying.

Researchers Chiao-Lin ‘Steven Meow’ Yu of Trend Micro Taiwan and Kai-Ching ‘Keniver’ Wang of CHT Security, found that vulnerabilities in smart bus systems could let hackers remotely track, control, or spy on vehicles, exposing risks from insecure onboard and remote components.

The duo presented their research during the DEF CON hacker conference last week, SecurityWeek reported.

Researchers probed smart bus security after spotting free passenger Wi-Fi. They found the same M2M router ran both Wi-Fi and vital in-vehicle systems for Advanced Public Transportation Services (APTS) and Advanced Driver Assistance Systems (ADAS). APTS includes GPS tracking, passenger/operator interfaces, route scheduling, and bus stop panels, all centrally managed, making shared network use a major cyber risk. ADAS uses sensors, cameras, radar, and LiDAR for collision warnings, lane alerts, speed and sign recognition, plus driver/passenger monitoring.

Researchers examined smart bus cybersecurity after spotting free passenger Wi-Fi. They found the same M2M router powered both the Wi-Fi and critical in-vehicle systems like APTS and ADAS. This posed risks, as ADAS aids driver safety with sensors, cameras, and monitoring, while APTS manages GPS, routes, schedules, and passenger information, all linked to a central system.

Researchers demonstrated how to bypass the router’s authentication and access APTS and ADAS due to the lack of any network segmentation. Researchers found hackers could remotely target vulnerable buses, track locations, access cameras with weak passwords, alter displays, steal data, and breach company servers. An attacker can steal and alter GPS, RPM, and speed data, triggering false alerts and impacting operations.

A detailed analysis of the environment revealed multiple vulnerabilities including an MQTT backdoor that allows remote attackers to access the bus systems. 

Researchers contacted router maker BEC Technologies and Taiwan’s Maxwin, but received no response, and the flaws remain unpatched.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Buses)




文章来源: https://securityaffairs.com/181045/hacking/smart-buses-flaws-expose-vehicles-to-tracking-control-and-spying.html
如有侵权请联系:admin#unsafe.sh