X

Tesla Model S key fobs were vulnerable to a low-tech hack

Researchers from a Belgian university found the weakness and Tesla has already fixed the issue.

rsreviewteslamodels60holdingstillrs.jpg
Enlarge Image
rsreviewteslamodels60holdingstillrs.jpg

Model S cars produced after June of 2018 are no longer vulnerable to having their key fobs cloned.

Roadshow

The is a high-tech car. Its ability to see the world around it and communicate with Tesla HQ would make it more vulnerable than many other less sophisticated cars to the machinations of hackers. To combat this, Tesla has doubled down on security and admirably, has done a great job of keeping hackers out, except for this one little, kind of low-tech thing: the key fob.

It turns out that despite all of Tesla's code checking and security updating, it's super easy to clone a Model S key and drive away with the car, according to researchers from KU Leuven university in Belgium. It takes just a few seconds and would make Nic Cage weep with pride. The researchers will publish a paper on their methods in the near future.

The hardware required to clone the key only costs a few hundred dollars and allows the hacker to snag the key fob's encrypted signal out of the air and decode it faster than you can say "Tesla Model S security vulnerability."

The fobs were built by a company called Pekton which allegedly only used a relatively unsophisticated 40-bit encryption protocol to protect them.

"Today it's very easy for us to clone these key fobs in a matter of seconds," says Lennert Wouters, a researcher at KU Leuven in a statement to Wired. "We can completely impersonate the key fob and open and drive the vehicle."

Tesla paid the researchers at the university a $10,000 bounty for finding the vulnerability and then went about fixing the issue.

Incredibly cool Tesla Easter eggs

See all photos

"Due to the growing number of methods that can be used to steal many kinds of cars with passive entry systems, not just Teslas, we've rolled out a number of security enhancements to help our customers decrease the likelihood of unauthorized use of their vehicles," said a Tesla representative in a statement to Roadshow. "Based on the research presented by this group, we worked with our supplier to make our key fobs more secure by introducing more robust cryptography for Model S in June 2018."

A separate software update issued by Tesla allows owners of cars bought before June 2018 to update to the newer, more secure key fob. For those owners who choose not to upgrade their fob, Tesla updated its software last year to allow users to disable passive entry entirely. In addition, all Model S owners can enable the PIN to Drive feature which was rolled out earlier this year.

We also received notice that Tesla would be adding the KU Leuven researchers to its Hall of Fame for their work in finding this security vulnerability.

Kyle Hyatt Former news and features editor
Kyle Hyatt (he/him/his) hails originally from the Pacific Northwest, but has long called Los Angeles home. He's had a lifelong obsession with cars and motorcycles (both old and new).
Kyle Hyatt
Kyle Hyatt (he/him/his) hails originally from the Pacific Northwest, but has long called Los Angeles home. He's had a lifelong obsession with cars and motorcycles (both old and new).

Article updated on September 10, 2018 at 2:45 PM PDT

Our Experts

Written by 
Kyle Hyatt
CNET staff -- not advertisers, partners or business interests -- determine how we review the products and services we cover. If you buy through our links, we may get paid. Reviews ethics statement
Kyle Hyatt Former news and features editor
Kyle Hyatt (he/him/his) hails originally from the Pacific Northwest, but has long called Los Angeles home. He's had a lifelong obsession with cars and motorcycles (both old and new).
Why You Can Trust CNET
174175176177178179180+
Experts Interviewed
030405060708091011121314+
Companies Reviewed
108109110111112113+
Products Reviewed

We thoroughly evaluate each company and product we review and ensure our stories meet our high editorial standards.