Security

Research

How to track equipped cars via exploitable e-ink platemaker

Miscreants could have tracked, modified, deleted digital plates


California's street-legal ink license plates only received a nod from the US government in October, but reverse engineers have already discovered vulnerabilities in the system allowing them to track each plate, reprogram them or even delete them at a whim.

In a blog post by security researcher Sam Curry, he describes a project targeting digital license plate maker Reviver put together with some friends, among several other automotive security experiments.

The system of Reviver, maker of the only commercially available digital license plate on the market and the company behind the push for E Ink plate legalization in California, caught Curry and his friends' attention because it included internal tracking tools for its plates.

"Since the license plate could be used to track vehicles, we were super interested in Reviver and began auditing the mobile app," Curry said.

Reviver plates began showing up on California roads in 2017 as part of a pilot program. Reviver said it deployed around 10,000 of them from 2017 until the pilot program was ended ahead of legalization.

One feature of the e-ink plates would be to notify owners if the vehicle was moved without their knowledge. If so, the plate could be changed to read STOLEN.

After a bit more digging and creation of a new Reviver account, Curry and friends found that their account was assigned a unique "company" JSON object that allowed them to add sub-users to their account. 

Interestingly enough, several of the other JSON fields in the company object were also editable, including one that defined the account type as "CONSUMER." Other account types were unlisted in the mobile app, and so Curry and co turned to Reviver's password reset URL.

"We observed that the [password reset] website had tons of functionality including the ability to administer vehicles, fleets, and user accounts," Curry said.

JavaScript on the site also contained a full list of other roles, and the crew found they were able to edit their account type to be any they desired.

Curry and friends ultimately gained access to a role called REVIVER, which broke the password reset site's UI, cluing them in that it might actually be an administrator account not designed to interact with the consumer interface. 

That turned out to be the case. 

"We could take any of the normal API calls (viewing vehicle location, updating vehicle plates, adding new users to accounts) and perform the action using our super administrator account with full authorization," Curry said. The site also gave them access to fleet management functionality.

Trolling was also a possibility with the permissions Curry found he could grant himself. The REVIVER role aditionally granted access to any dealership that packaged the plates, allowing Curry to change the default images from DEALER to, well, whatever inappropriate phrase would fit.

Along with elevating the permissions on the account used in the experiment, Curry said the company role object, which gives permission to invite sub-users, allowed him to invite others with elevated permissions.

"An actual attacker could remotely update, track, or delete anyone's REVIVER plate," Curry said. 

The vulnerability was reported to Reviver, which Curry said patched it "in under 24 hours."

The company confirmed this, telling The Register: "We are proud of our team's quick response," adding: "Our investigation confirmed that this potential vulnerability has not been misused. Customer information has not been affected, and there is no evidence of ongoing risk related to this report."

Reviver plates are street legal in California, Arizona and Michigan, and in the state of Texas for commercial vehicles only. Several other states are piloting the technology; at between $800 and nearly $1,000 for a two-year contract, hopefully Reviver is a bit more secure now than at launch. ®

Send us news
90 Comments

California commission says Cruise withheld data about parking atop of a pedestrian

Stalled self-driving car biz up to its axles in problems

Tesla sues Swedish government after worker rebellion cripples car biz

Sparks fly as Elon's Musketeers sue for license plate liberation

Car dealers openly beg Biden to put brakes on electric vehicle drive

No one's buying these things. Just, uh, ignore the massive markups

Logitech's Wave Keys tries to bend ergonomics without breaking tradition

Or your wallet

Arm's tiny Cortex-M52 packs AI punch for small devices

Helium tech to end up on $1-$2 SoCs claimed to bring big performance gains for ML workloads

Right-to-repair fight going national as FTC asked to lay down the law

Why shouldn't you be able to fix your own kit? Clue: Profit is involved

AMD SEV OMG: Trusted execution in VMs undone by bad hypervisors' cache meddling

Let's do the CacheWarp again

Intel emits patch to squash chip bug that lets any guest VM crash host servers

Sapphire Rapids, Alder Lake, Raptor Lake chip families treated for 'Redundant Prefix'

Downfall fallout: Intel knew AVX chips were insecure and did nothing, lawsuit claims

Billions of data-leaking processors sold despite warnings and patch just made them slower, punters complain

Cruise admits its driverless robo-taxis need a human at the remote-control wheel

Plus: Parent GM taps brakes on AI van production

UK signals legal changes to self-driving vehicle liabilities

But with technical and insurance industry question unanswered, a few potholes may lie ahead

It's perfectly legal for cars to harvest your texts, call logs

Just because they store messages in a way owners can't access doesn't mean it's a privacy violation, US court rules