Kali Linux

CVE-2022-27254 : PoC For Vulnerability In Honda’s Remote Keyless System

CVE-2022-27254 is a PoC for vulnerability in Honda’s Remote Keyless System(CVE-2022-27254).

Summary

This is a proof of concept for CVE-2022-27254, wherein the remote keyless system on various Honda vehicles send the same, unencrypted RF signal for each door-open, door-close, boot-open and remote start(if applicable). This allows for an attacker to eavesdrop on the request and conduct a replay attack.

Vehicles Affected

• 2016-2020 Honda Civic(LX, EX, EX-L, Touring, Si, Type R)

Important Notes

Key fob FCC ID: KR5V2X
•Key fob frequency: 433.215MHz
•Key fob modulation: FSK

Tools used

•FCCID.io
•HackRF One
•Gqrx
•GNURadio

Prevention

  • Manufacturers:
    • Manufacturers must implement Rolling Codes, otherwise known as hopping code. It is a security technology commonly used to provide a fresh code for each authentication of a remote keyless entry (RKE) or passive keyless entry (PKE) system.
  • Consumers:
    • Utilize a Faraday Pouch for the key fob.
    • Use the PKE as opposed to the RKE, this would make it significantly harder for an attacker to clone/read the signal due to the proximity they would need to be at to do so.

 The precautions mentioned above ARE NOT foolproof 

If you believe that you are a victim of this attack, the only current mitigation is to reset your key fob at the dealership.

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 week ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

3 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

3 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

3 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 weeks ago