Critical Bluetooth Vulnerability Could Let Hackers Remotely Control Cars

Bluetooth Vulnerability Exposes Millions of Cars to Hackers

Researchers at PCA Cyber Security have discovered serious vulnerabilities in a widely used Bluetooth stack that could allow attackers to remotely hack into millions of vehicles. The flaws lie within BlueSDK, a Bluetooth framework developed by OpenSynergy, commonly integrated into modern car infotainment systems.

What Is PerfektBlue?

The PCA team uncovered several security flaws in BlueSDK and demonstrated how these could be chained in a cyberattack they’ve named PerfektBlue. This exploit allows an attacker to compromise a car’s infotainment system over Bluetooth—without needing direct access to the vehicle.

Once inside the infotainment system, hackers can:

  • Track the vehicle’s location in real time
  • Record audio from within the car
  • Access the driver’s phonebook and personal contact data

More alarmingly, researchers warn that attackers could potentially move laterally from the infotainment system to critical vehicle controls, such as:

  • Steering
  • Horn
  • Windshield wipers

While these controls were not directly exploited in the demo, past research shows such escalations are possible.

Vehicles and Devices at Risk

PerfektBlue has already been demonstrated against recent infotainment units in Mercedes-Benz, Volkswagen, and Skoda vehicles. Another unnamed OEM, whose systems were also found vulnerable, was recently notified of the issue.

Because BlueSDK is used in millions of devices, the risk extends beyond cars. Mobile phones and portable tech devices from major manufacturers may also be exposed.

How Does PerfektBlue Work?

To carry out a Bluetooth car hack, the attacker must be within pairing range of the vehicle. Depending on the system’s configuration, they might be able to:

  • Pair with the infotainment system silently
  • Trigger an attack with a single user click
  • Exploit the system without the driver’s knowledge

According to PCA Cyber Security, “PerfektBlue requires at most 1-click from a user to be exploited over-the-air.”

CVEs Assigned to the PerfektBlue Vulnerability

The vulnerabilities were responsibly disclosed to OpenSynergy in May 2024 and are now tracked under the following CVE identifiers:

  • CVE-2024-45434
  • CVE-2024-45431
  • CVE-2024-45432
  • CVE-2024-45433

What You Can Do

Lastly, while patching depends on the vendor and your car’s manufacturer, vehicle owners should:

  • Regularly update their infotainment firmware
  • Avoid pairing with unknown Bluetooth devices
  • Check with their dealership for security updates
  • Disable Bluetooth when not in use

Full article available to view here. 

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

McDonald’s AI bot exposed job applicant

McDonald’s AI Job Bot Leaks Candidate Data

Ransomware negotiator

Ransomware Negotiator Scandal Rocks Recovery Industry

Cartel Cyber Espionage

Cartel Cyber Espionage: FBI Exposed by UTS Surveillance