A hacker could control the charging functions related to the electric vehicle's lithium-ion battery Two security researchers have demonstrated security vulnerabilities in the Nissan Leaf electric car by using mobile management APIs supplied by the car manufacturer.The unsecured APIs allow anyone who knows the VIN number of a car to access non-critical features such as climate control and battery charge management from anywhere across the Internet. Additionally, someone exploiting the unauthenticated APIs can see the car’s estimated driving range.[ MORE HACKED CARS: Security Short Take: Hackers remotely take control of Jeep ]“The other main concern here is that the telematics system in the car is leaking all of my historic driving data,” one security expert said in a blog post. “That’s the details of every trip I’ve ever made in the car, including when I made it, how far I drove and even how efficiently I drove. This could easily be used to build up a profile of my driving habits, considering it goes back almost 2 years, and predict when I will be away from home. This kind of data should be collected and secured with the utmost respect for my privacy.” Vehicle Identification Numbers are easily visible through a vehicle’s windshield.In a blog and embedded video, the security researchers, Scott Helme and Troy Hunt, described the discovery by a third unnamed person who’d been attending a security workshop with them. Hunt, who is from Australia, then demonstrated how he was able to access Helme’s NIssan Leaf — even though he was 10,000 miles away in England. “What the workshop attendee ultimately discovered was that not only could he connect to his LEAF over the internet and control features independently of how Nissan had designed the app, he could control other people’s LEAFs,” Hunt wrote in the blog post.The APIs used to access Nissan Leaf cars work with Android or iOS devices.The security workshop attendee, Hunt wrote, went back to his hotel room the first day and proxied his iPhone via his PC, using Fiddler debugging software.“This takes a few minutes to setup and effectively what it means is that he can now observe how the mobile app talks to the online services. Jan then fires up the NissanConnect EV app. Nissan The NissanConnect app.While Hunt said the vulnerabilities could not be exploited to create a life-threatening situation, hackers could use the NissanConnect app to do things such as run down a vehicle’s battery.“It’s much like being able to start the engine in a petrol car to run the AC, it’s going to start consuming the fuel you have in the tank. If your car is parked on the drive overnight or at work for 10 hours and left running, you could have very little fuel left when you get back to it…. You’d be stranded,” Hunt wrote. Nissan did not immediately reply to a request for comment.In an interview with the BBC, Hunt said the right thing for Nissan to do would be to turn off the app altogether.“They are going to have to let customers know. And to be honest, a fix would not be hard to do,” Hunt said. Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Malware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe