A Pektron Passive Keyless Entry and Start (PKES) system, as used on the Tesla Model S and possibly other vehicles, relies on the DST40 cipher, which makes it easier for attackers to obtain access via an approach involving a 5.4 TB precomputation, followed by wake-frame reception and two challenge/response operations, to clone a key fob within a few seconds.
References
Link | Resource |
---|---|
https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyless-entry-and-start-in-modern-supercars/ | Exploit Third Party Advisory |
https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyless-entry-and-start-in-modern-supercars/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyless-entry-and-start-in-modern-supercars/ - Exploit, Third Party Advisory |
Information
Published : 2018-09-10 23:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16806
Mitre link : CVE-2018-16806
CVE.ORG link : CVE-2018-16806
JSON object : View
Products Affected
pektron
- passive_keyless_entry_and_start_system
- passive_keyless_entry_and_start_system_firmware
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm