![]() This is where the hacker community has taken an important role in the past decades: using curiosity and skills to demonstrate that the changes in the name of progress sometimes have a downside that we need to consider.Īt Computest, our mission is to improve the quality of the software that surrounds us. ![]() In the big rush forward, we as a society aren’t always too concerned with these risks until they manifest themselves. However, these rapid changes also pose risks. Thinking of IoT products in domotics and healthcare, it’s easy to find countless examples of how this interconnectedness improves our quality of life. Our world is becoming more and more digital, and the devices we use daily are becoming connected more and more. ![]() The vulnerabilities can be exploited via a cellular connection, leading to the cars CAN bus. In this post we describe multiple vulnerabilities we found in the infortainment system used in cars from the Volkswagen Auto Group. JVolkswagen Auto Group MIB infotainment system - unauthenticated remote code execution as root ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |