UK cybersecurity research firm NCC Group has revealed a weakness in Bluetooth Low Energy technology that potentially leaves millions of locks vulnerable — including those on your Tesla or home.
NCC Group senior security consultant Sultan Qasim Khan detailed the attack method.
“Many products implement Bluetooth Low Energy (BLE) based proximity authentication, where the product unlocks or remains unlocked when a trusted BLE device is determined to be nearby,” Khan wrote in a research report.
Cybersecurity researchers have revealed a weakness in Bluetooth Low Energy technology that potentially leaves millions of locks vulnerable — including those on your Tesla or home.
Common examples of BLE products include phone-as-a-key systems on cars, residential smart locks, and smartphones. In a demo for Reuters, Khan opened and then drove a 2021 Tesla Model Y.
Khan hacked the BLE identification of Tesla Phone-as-a-Key entry system and Kwikset/Weiser residential smart locks using what is known as a “relay attack,” which uses two hardware devices — one near the BLE’s recognized device, the other near the lock it controls — to trick the lock into thinking its owner is nearby.
By placing one relay device within 15 yards of a Tesla owner’s phone or fob, and another in his laptop near the car, Khan was able to “relay” the BLE identification from the owner’s device to his own, hijacking the ride in an example for Bloomberg News.
While NCC told Bloomberg that Tesla acknowledged that relay attacks can be an issue, fixing it would require changes to both their hardware and keyless entry system. Kwikset told Bloomberg that customers can use two factor identification and that the locks have a 30-second timeout when devices are stationary to help prevent intruders from getting in.
“The Bluetooth Special Interest Group (SIG) prioritizes security and the specifications include a collection of features that provide product developers the tools they need to secure communications between Bluetooth devices,” the company told Bloomberg in a statement.
“The SIG also provides educational resources to the developer community to help them implement the appropriate level of security within their Bluetooth products, as well as a vulnerability response program that works with the security research community to address vulnerabilities identified within Bluetooth specifications in a responsible manner.”
Khan also recommended in his general report on BLE’s susceptibility to relay attacks that users be required to prove proximity — e.g., interacting with the BLE trusted device, like unlocking your phone or opening the app.
We’d love to hear from you! If you have a comment about this article or if you have a tip for a future Freethink story, please email us at [email protected].