Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft

Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft

Posted on August 11, 2025August 11, 2025 By CWS

Vulnerabilities found by a researcher in a significant automaker’s dealership techniques may have been exploited to remotely hack automobiles and procure private info.

The analysis was summarized over the weekend by Eaton Zveare, researcher at Traceable, on the DEF CON hacking convention. The researcher instructed SecurityWeek that he’ll quickly publish a weblog publish detailing the findings. 

Lately, Zveare discovered vulnerabilities within the on-line platforms of a number of main automotive producers, together with Honda and Toyota.

His newest analysis targeted on a web based platform utilized by greater than 1,000 US dealerships belonging to an unnamed carmaker. The platform can be utilized to order automobiles, make gross sales, and handle prospects. Whereas it’s accessible over the web, automotive dealership workers want an invitation with the intention to register an account. 

Nevertheless, the researcher was capable of finding the account registration type even with out an invite, and abused a profile updating performance together with API vulnerabilities to create a ‘nationwide admin’ account that gave him full entry to the platform.

[ Read: Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking ]

Zveare seen that the platform allowed sellers to lookup a car based mostly on the client’s identify or the automotive’s VIN. With the assistance of a good friend who owns a car made by the affected carmaker, he performed some assessments and located that he was in a position to abuse the platform to switch the possession of the car to a newly created account.

Along with his account tied to the focused automotive, Zveare was in a position to make use of the related cellular software to remotely monitor the car’s location, unlock it, and begin the engine. Commercial. Scroll to proceed studying.

The researcher believes the assault would have labored in opposition to any automotive mannequin made since 2012 so long as it had a normal telematics module. The attacker solely wanted to know the sufferer’s identify. 

Additional analysis led to the invention of various portals utilized by the identical model — together with for loaner automobiles — on which Zveare additionally managed to acquire elevated privileges, which granted him entry to buyer and worker private info, contracts, monetary paperwork, automotive monitoring, and different inside performance. 

Traceable, which makes a speciality of software and API safety, instructed SecurityWeek that the identify of the impacted automaker is just not being shared, however the firm did handle the vulnerabilities after being notified.

“The objective of this analysis is to not name out one firm — it’s to spotlight broader, systemic dangers in dealer-manufacturer platforms that always fly beneath the radar. Naming names shifts the dialog away from what actually issues: bettering safety throughout the trade,” Traceable stated.

Associated: Hundreds of thousands of Vehicles Uncovered to Distant Hacking through PerfektBlue Assault

Associated: Nissan Leaf Hacked for Distant Spying, Bodily Takeover

Associated: Subaru Starlink Vulnerability Uncovered Vehicles to Distant Hacking

Security Week News Tags:Allowed, Automakers, Car, Data, Dealership, Flaws, Hacking, Major, Personal, Systems, Theft

Post navigation

Previous Post: Focusing Security Where Business Value Lives
Next Post: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More

Related Posts

React Native Vulnerability Actively Exploited in Attacks React Native Vulnerability Actively Exploited in Attacks Security Week News
HeroDevs Raises 5 Million to Secure Deprecated OSS HeroDevs Raises $125 Million to Secure Deprecated OSS Security Week News
BIND Updates Address Critical Security Vulnerabilities BIND Updates Address Critical Security Vulnerabilities Security Week News
China-Linked Cyber Espionage Targets Asian Militaries China-Linked Cyber Espionage Targets Asian Militaries Security Week News
Nevada Introduces New Data Classification Policy Nevada Introduces New Data Classification Policy Security Week News
Spanish Crackdown on Anonymous Fénix Hackers Spanish Crackdown on Anonymous Fénix Hackers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark