View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Jeep Cherokee hacked, highlights connected car vulnerabilities

The vulnerability was found in Uconnect software.

By CBR Staff Writer

Security researchers have reportedly hacked into a running Fiat Chrysler’s Jeep Cherokee, raising strong concerns about connected cars.

The researchers said that the vehicle is vulnerable to hacking, giving access to some of the car’s vital systems to hackers who could potentially cause mayhem on road.

The vulnerability was discovered by security researchers Charlie Miller and Chris Valasek, who hacked FCA’s Uconnect internet-enabled software, which allowed them access to other systems of the car.

Uconnect software is a wireless communications system, which has been introduced to several Fiat Chrysler cars since late 2013.

The system controls the car’s entertainment, navigation, remote ignition, the locking of doors and control of the headlights using an app. Experts claimed that the system is vulnerable, as hackers have to only work their way up to car’s IP address to get into the system and take control of the vehicle.

They also claimed that more than 470,000 cars made by the automaker are at risk of hacking including the ones that are driven on UK roads.

The experts used a laptop and mobile phone to gain control of the vehicles on-board system and were able toblast out cold air, turn the radio on full volume, activate windscreen wipers and turn on the wiper fluid. Of greater concern was their ability to slow the car which caused a tailback on the road.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester reported Fiat Chrysler as saying: "Under no circumstances does FCA condone or believe it’s appropriate to disclose "how-to information" that would potentially encourage, or help enable hackers to gain unauthorized and unlawful access to vehicle systems.

"We appreciate the contributions of cyber security advocates to augment the industry’s understanding of potential vulnerabilities.

"However, we caution advocates that in the pursuit of improved public safety they not, in fact, compromise public safety."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.