The selling point of Tesla electric cars is "smart". Many of the smart elements of this expensive high-end electric sports car are carried. A very specific form of expression is the disappearance of various buttons in the car, replaced by touch screens. Method for command input.

At the same time, security issues have also become a hurdle for smart cars. The reporter learned yesterday from Qihoo 360 that 360 found that Tesla's automotive applications had design flaws that could enable the attacker to remotely control the vehicle. 360 company security experts will be on site to crack this vulnerability at the 2014 SyScan360 conference. The reporter learned that Tesla has received details of the vulnerability and responded that it will “respond to and repair the quick action”.


The attacker can unlock windows remotely

The 360 ​​company’s professional team recently studied the Tesla Model S car and found that its application process had a design flaw. The attacker used this loophole to remotely control the vehicle, unlocking, whistle, flashing lights, and opening the sunroof. Open the skylight while the vehicle is moving. However, 360 companies declined to give more details.

Does such a loophole mean that the owners of ModelS must face the crisis driving environment? 360 company's security experts told reporters that car users do not have to be too alarmed, this type of vulnerability is more difficult to use, "for the current hidden dangers, ordinary car owners in the Tesla setting off the remote access switch can effectively avoid the potential hazards."

It is reported that 360 companies have recently submitted relevant vulnerability details and solutions proposals to Tesla and expressed their willingness to provide technical support for Tesla's repair of related vulnerabilities. This is also the first time that a global professional security company has discovered a vulnerability in the Tesla application.

On the evening of July 15th, Tesla’s headquarters in China responded to this by saying: “We value vehicle and customer safety very much. We are committed to working with security researchers to validate our responsibility in accordance with our security vulnerability reporting policy. Replay, address, and fix loopholes in the report.” The response also pointed out: “We will investigate any legal loopholes in the report and take quick action to deal with and fix it.”

This is not the first time in the world that there is a voice that can remotely control Tesla. Prior to this, foreign media reported that hackers used Tesla's six-digit password to remotely control the car. 360 chief scientist and Professor Jiang Xuxian, head of the 360 ​​Mobile Security Research Institute, told reporters that the technical threshold for launching attacks on smart cars is still high, and the probability of successfully exploiting such loopholes is low.

Smart car safety commentary

The discovery of this application loophole once again sparked discussions about the safety of smart cars. Based on new energy technologies and human-computer interaction technologies, especially the wide application of the car networking technology, smart cars represented by Tesla are becoming a new fashion and lifestyle, but the public has hidden dangers and precautions for smart cars. Little is known about the measures. Previously, Tencent Automotive Channel had conducted an "intelligent vehicle information system consumer survey". Respondents have the most prominent requirements concerning security, and they also reflect users' concerns about the safety of smart cars.

The reporter learned from 360 companies that at the 2014 SyScan360 conference held today, the world’s first smart car system security cracking challenge will also begin. The target of the competition is Tesla. The 360 ​​company's security experts will demonstrate the entire process of cracking Tesla related applications. In addition, the organizer will also throw a prize of 10,000 US dollars to attract security enthusiasts, hoping to help the public through this crackdown competition to understand more deeply the possible safety issues of smart cars, understand how to use the technology of car networking to prevent malice Destruction and attack allow the car to “reject” its wrong intentions and protect the safety of the driver and passengers.

Tesla China also expressed its support for this crackdown yesterday: “While Tesla did not participate in the conference and is not a sponsor of the competition, we support the idea of ​​providing an environment for responsible security. Researchers help identify potential vulnerabilities."