Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models including Mazda 3 (2014-2021), to execute arbitrary code with root permission.

  • Death_Equity@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 days ago

    There is no remote access to the system. So the person would need to have physical access to the USB port to retrieve any data.

    Every car has a vulnerability that can allow someone to put a tracker on your car and it takes a couple seconds to execute with no advanced technical ability, sticking a GPS tracker with a 4g connection to the bottom of the chassis. Bugging a car is as easy as sticking a recording device under the seat.

    • Ajen@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      4 days ago

      All of the people I listed would have physical access for hours, out of sight of the owner. (see edit)

      Is easy to find a tracker that’s stuck to the bottom of a car if you put it on a lift and spend a few minutes with a flashlight (and since just takes a minute and a lot of mechanics are decent people, it’s not hard to find someone to do it for free). And they either have batteries that will run out, or have to be wired to the battery which limits where they can be hidden.

      Edit: misread your post, didn’t see that you were talking about physical access to retrieve data, not bug the car. I’m pretty sure these cars have Bluetooth and wifi though, which the entertainment system most likely has access to.