Tesla Backs Up Car Security Firmware to promote Product Security


Tesla Backs Up Car Security Firmware to promote Product Security

Tesla is an American based automotive and Energy Storage company founded in 2003. This Multi National Corporation specialises in designing, manufacturing and selling electric cars, battery products and electric vehicle power train components. The sole motive of this premium electric-car brand is to accelerate world’s transition to sustainable energy and move towards zero- emission future.Tesla Backs Up Car Security Firmware

Tesla is renowned worldwide for its security-aware attitude. The infamous hardware and firmware manufacturer is known to focus on improving the security of their products and service offerings. Taking the security advantage to the next level, Tesla recently disclosed its safety and protection guidelines. As per the disclosed guidelines, Tesla Backs Up Car Security Firmware. The manufacturer of the infamous electric vehicles welcomes researchers to probe software in its cars for security bugs.

Directives for Engagement 

The participating researchers need to register themselves as well as seek registration for research-registered vehicle on Tesla’s Vulnerability reporting website to carry out the research. They are also  required to comply with the following guidelines to avoid any legal actions against them. These include:

  • On finding vulnerabilities, researchers are required to validate the vulnerability and share it with the company’s representatives along with a Proof of Concept (POC).
  • Researchers are strictly recommended not to make the vulnerability details public unless corrected.
  • The Modus Operandi should be conducted only on the vehicles that you have permission to access.

Tesla Backs Up Car Security Firmware

If while performing good-faith security research, researchers cause a software glitch, Tesla provides provision to ‘Reflash” the vehicle’s firmware at its service centre to restore vehicle’s software.

Also, pre-approved, good-faith security researchers are exempted from Computer Fraud and Abuse Act (“CFAA”) and Digital Millennium Copyright Act (“DMCA”).

CFAA: Computer Fraud and Abuse Act (CFAA) is a United States cyber security Bill enacted in 1986. The law prohibits the access of the system without authorization or in excess of authorization.

DMCA: Digital Millennium Copyright Act is a United States copyright law enacted in 1998.  The law criminalizes production and dissemination of services, technology or devices intended to deceive or control access to copyrighted works. The car manufacturing brand exempts its pre-approved researchers from this law provided they do not access any other codes or binaries.

Tesla Backs Up Car Security Firmware and provides such security slacks to its researchers to encourage them to find bugs and make its products more secure.

If the vulnerability discovered by the researcher is confirmed, they are promised amazing rewards. Besides their name will be listed on Tesla’s Hall of Fame (unless they prefer to remain anonymous).

However, in case the researcher breaches the security guidelines provided by Tesla, the company reserves the right to unregister the researcher and the research-registered vehicle at any time. The agenda adopted by Tesla car manufacturers helped in identifying severe security breaches. For instance:

  • Hot-Wire Stealing: Thanks to this bounty program! Researchers prevented your $100,000 vehicle from being embezzled by the thieves.hot-wire

As a part of this program researchers found that the car could be stolen by plugging in the laptop into a network cable, futz with the cables, establish a network connection and start the car with a software command and drive off. The vulnerability was discovered in world’s first ever premium electric Sedan-the Model S.

The researchers also discovered ways of remotely cutting the engine while someone else drove the car by implanting a remote-access Trojan on Model S’ network.

  • Out- of date infotainment browser: Out- of date infotainment browser It was found that the infotainment system of the car used an out-of-date-browser that was susceptible to remote hacking. For instance, an attacker could design a malicious web page, and if someone in the car with the outdated infotainment system visited the pernicious site, could gain access to this broadcast material which is intended both to entertain and to inform.
Virus Removal Guidelines