Archived

Norway: Chinese-made electric buses have major security flaw, can be remotely stopped and disabled by their manufacturer in China, Oslo operator says

The public transport operator in Norway’s capital said Tuesday that some electric buses from China have a serious flaw – software that could allow the manufacturer, or nefarious actors, to take control of the vehicle.

Oslo’s transport operator Ruter said they had tested two electric buses this summer – one built by China’s Yutong and the other by Dutch firm VDL.

The Chinese model featured a SIM card that allowed the manufacturer to remotely install software updates that made it vulnerable, whereas the Dutch model did not.

“We’ve found that everything that is connected poses a risk – and that includes buses,” Ruter director Bernt Reitan Jenssen told public broadcaster NRK.

“There is a risk that for example suppliers could take control, but also that other players could break into this value chain and influence the buses.”

Ruter said it was now developing a digital firewall to guard against the issue.

According to other reports, the Chinese manufacturer has access to each bus’s software updates, diagnostics, and battery control systems. “In theory, the bus could therefore be stopped or rendered unusable by the manufacturer,” the company said.

Ruter has reported its findings to Norway’s Ministry of Transport and Communications.

Arild Tjomsland, a special advisor at the University of South-Eastern Norway who helped conduct the tests, said: “The Chinese bus can be stopped, turned off, or receive updates that can destroy the technology that the bus needs to operate normally.”

[…]

  • Alcoholicorn@mander.xyz
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    25
    ·
    24 hours ago

    Did they find an actual vulnerability or are they calling remote software updates and sending diagnostic data back to the manufacturer a vulnerability?

    • jonesy@aussie.zone
      link
      fedilink
      English
      arrow-up
      31
      ·
      23 hours ago

      There’s no good reason to connect a bus to the internet, just do software updates when it gets maintained. There’s plenty of devices on Shodan.io that had no known vulnerabilities when they were new but are huge security risks now, from routers to printers to webcams.

      • trollercoaster@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        3
        ·
        23 hours ago

        Even if software updates come during maintenance, the same problem persists. The manufacturer can brick the damn thing via an update. The bricking just can’t that easily happen at any arbitrary moment.

        If it’s truly offline, there is also less attack surface for non manufacturer approved malicious actors.

        Every software has bugs. Every device that runs software and can be accessed remotely does have vulnerabilities. The problem is that we as a society think that it’s a good idea to have every toaster and every bus connected to the internet. Welcome to the internet of shit.

        • Ek-Hou-Van-Braai@piefed.social
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          23 hours ago

          You can revert it to a older version though.

          With most cars you flash the ECU with software using a diagnostic tool, if you don’t like the new version you can just flash a older version on there.

          Or in many cases modify it and flash your custom version.

          You don’t have that control if it’s all Internet dependant, and there’s no kill switch.

          • WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            14 hours ago

            You can revert it to a older version though.

            if the maker allows it. try that with your smartphone and it will irreversibly turn into an expensive brick. look up android rollback protection

          • trollercoaster@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            3
            ·
            22 hours ago

            Unless you can (and actually do) audit the entire software, you can’t know whether there isn’t any kill switch in it. Even if it’s just a simple timer that will break shit once the warranty has expired. Or something that reacts to a seemingly innocuous external trigger.

            • Ek-Hou-Van-Braai@piefed.social
              link
              fedilink
              English
              arrow-up
              3
              ·
              edit-2
              22 hours ago

              And we can never make cars 100% safe. That doesn’t mean we shouldn’t care about seat-belts, airbags, ABS and crumple zones.

              Just because we can’t make the danger zero, doesn’t mean we shouldn’t do the bare minimum to mitigate the danger.

              • Maeve@kbin.earth
                link
                fedilink
                arrow-up
                1
                ·
                12 hours ago

                The Internet connection aspect can be made zero. Cars don’t really need computers.

              • trollercoaster@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                3
                arrow-down
                1
                ·
                22 hours ago

                Yes, and bare minimum is a good keyword, because sometimes, less is more. Especially when it comes to the amounts of software and connectivity. Complexity causes problems.

                I am old enough to have ridden on buses that did run exactly zero software. And you know what? Those things would just keep on working for decades, despite rolling all day long every day every week all year round.

      • Amnesigenic@lemmy.ml
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        2
        ·
        16 hours ago

        Your account exists solely to play the issue up as far as you can get it to go, you’re a racist propagandist and you’re mad that people are correctly identifying you as such

      • Alcoholicorn@mander.xyz
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        18
        ·
        edit-2
        23 hours ago

        Trying to understand the actual issue instead of just accepting the deceptive narrative the headline promotes is not downplaying the issue.

        But “electric bus receives remote updates” fails to generate clicks or xenophobia.

        You just don’t like it when someone doesn’t instantly accept whatever hostile evidence you’ve dredged up to support the agenda you constantly push.

        • Slotos@feddit.nl
          link
          fedilink
          English
          arrow-up
          12
          arrow-down
          1
          ·
          23 hours ago

          The Chinese model featured a SIM card that allowed the manufacturer to remotely install software updates that made it vulnerable, whereas the Dutch model did not.

          Everything you needed to know was openly stated in the article. But you love riding that imaginary tall horse of yours.

          • Alcoholicorn@mander.xyz
            link
            fedilink
            English
            arrow-up
            13
            arrow-down
            16
            ·
            23 hours ago

            Most people read vulnerability and assume an exploit was found, not that the bus uses an extremely common practice that applies to like 99% of EVs and 80% of modern ICE cars, but not these Dutch buses, apparently. Hell even some ICE motorcycles get remote updates.

            • Slotos@feddit.nl
              link
              fedilink
              English
              arrow-up
              16
              arrow-down
              1
              ·
              23 hours ago

              For a public infrastructure, unattended remote updates are a vulnerability. This is clearly and openly explained in the article.

              Especially for countries where vast majority of workforce commutes using said infrastructure. A single uncontrolled update could cripple not just transportation, but every other public service.

              • Maeve@kbin.earth
                link
                fedilink
                arrow-up
                1
                arrow-down
                1
                ·
                12 hours ago

                unattended remote updates are a vulnerability

                Whose fault is it if unattended?

          • Alcoholicorn@mander.xyz
            link
            fedilink
            English
            arrow-up
            8
            arrow-down
            6
            ·
            20 hours ago

            The first European manufacturer of buses I can think of, Daimler also does it, this is an extremely common practice. It literally is only making the news to stoke sinophobia.

            Why are you @ing my old account? I stopped using it after I traveled through China and found they blocked HB.

            • Hotznplotzn@lemmy.sdf.orgOP
              link
              fedilink
              English
              arrow-up
              8
              arrow-down
              5
              ·
              20 hours ago

              @alcoholicorn@hexbear.net

              It doesn’t help if you ignore what others have written. Again, read the post:

              The Chinese model featured a SIM card that allowed the manufacturer to remotely install software updates that made it vulnerable, whereas the Dutch model did not.

              The Chinese model had that, the Dutch model didn’t. It is apparently not “extremely common practice” as the Dutch model didn’t have that vulnerability.

              Your statement is simply false. And this is not sinophobia but a simple fact.

              • Alcoholicorn@mander.xyz
                link
                fedilink
                English
                arrow-up
                6
                arrow-down
                7
                ·
                19 hours ago

                It is so common the first 4 euro bus manufacturers I can think of all do it. There are no articles about MAN buses being vulnerable, nor Volvo, nor mercades. The fact that you didn’t look any of this up betrays that you don’t care about buses using OTA updates or whatever, only its utility as hostile evidence.

    • Hell_nah_brother@thelemmy.club
      link
      fedilink
      English
      arrow-up
      14
      arrow-down
      5
      ·
      24 hours ago

      The Chinese model featured a SIM card that allowed the manufacturer to remotely install software updates that made it vulnerable, whereas the Dutch model did not.

      “We’ve found that everything that is connected poses a risk – and that includes buses,” Ruter director Bernt Reitan Jenssen told public broadcaster NRK.

      Yes. Also “spacewars.com”? This is a dogshit flamin garbage blog.