Tesla Model S key fobs were vulnerable to a low-tech hack

Researchers from a Belgian university found the weakness and Tesla has already fixed the issue.

Model S cars produced after June of 2018 are no longer vulnerable to having their key fobs cloned.

The Tesla Model S is a high-tech car. Its ability to see the world around it and communicate with Tesla HQ would make it more vulnerable than many other less sophisticated cars to the machinations of hackers. To combat this, Tesla has doubled down on security and admirably, has done a great job of keeping hackers out, except for this one little, kind of low-tech thing: the key fob.

It turns out that despite all of Tesla's code checking and security updating, it's super easy to clone a Model S key and drive away with the car, according to researchers from KU Leuven university in Belgium. It takes just a few seconds and would make Nic Cage weep with pride. The researchers will publish a paper on their methods in the near future.

The hardware required to clone the key only costs a few hundred dollars and allows the hacker to snag the key fob's encrypted signal out of the air and decode it faster than you can say "Tesla Model S security vulnerability."

The fobs were built by a company called Pekton which allegedly only used a relatively unsophisticated 40-bit encryption protocol to protect them.

"Today it's very easy for us to clone these key fobs in a matter of seconds," says Lennert Wouters, a researcher at KU Leuven in a statement to Wired. "We can completely impersonate the key fob and open and drive the vehicle."

Tesla paid the researchers at the university a $10,000 bounty for finding the vulnerability and then went about fixing the issue.

"Due to the growing number of methods that can be used to steal many kinds of cars with passive entry systems, not just Teslas, we've rolled out a number of security enhancements to help our customers decrease the likelihood of unauthorized use of their vehicles," said a Tesla representative in a statement to Roadshow. "Based on the research presented by this group, we worked with our supplier to make our key fobs more secure by introducing more robust cryptography for Model S in June 2018."

A separate software update issued by Tesla allows owners of cars bought before June 2018 to update to the newer, more secure key fob. For those owners who choose not to upgrade their fob, Tesla updated its software last year to allow users to disable passive entry entirely. In addition, all Model S owners can enable the PIN to Drive feature which was rolled out earlier this year.

We also received notice that Tesla would be adding the KU Leuven researchers to its Hall of Fame for their work in finding this security vulnerability.