Story Details

  • Hacking Subaru: Tracking and Controlling Cars via the Starlink Admin Panel

    Posted: 2025-01-23 12:22:19

    Security researcher Sam Curry discovered multiple vulnerabilities in Subaru's Starlink connected car service. Through access to an internal administrative panel, Curry and his team could remotely locate vehicles, unlock/lock doors, flash lights, honk the horn, and even start the engine of various Subaru models. The vulnerabilities stemmed from exposed API endpoints, authorization bypasses, and hardcoded credentials, ultimately allowing unauthorized access to sensitive vehicle functions and customer data. These issues have since been patched by Subaru.

    Summary of Comments ( 158 )
    https://news.ycombinator.com/item?id=42803279

    Hacker News users discuss the alarming security vulnerabilities detailed in Sam Curry's Subaru hack. Several express concern over the lack of basic security practices, such as proper input validation and robust authentication, especially given the potential for remote vehicle control. Some highlight the irony of Subaru's security team dismissing the initial findings, only to later discover the vulnerabilities were far more extensive than initially reported. Others discuss the implications for other connected car manufacturers and the broader automotive industry, urging increased scrutiny of these systems. A few commenters point out the ethical considerations of vulnerability disclosure and the researcher's responsible approach. Finally, some debate the practicality of exploiting these vulnerabilities in a real-world scenario.