FPT Software's Technology Community
  • Contact Us

How will an attack on your car's infotainment system look like?

How will an attack on your car’s infotainment system look like?

1 answer

Staff March 11, 2017

An attacker who could access the car’s infotainment system via a compromised smart phone could potentially leverage heap overflow vulnerabilities identified by the researchers to gain control flow of the vehicle. From there, an attacker could leverage control over the IVI application to speak directly to the CAN (controller area network) and send arbitrary and potentially malicious messages on the vehicle’s CAN bus.


Please login or Register to Submit Answer