Flipper Zero 暗网固件绕过滚动代码安全机制
Flipper Zero dark web firmware bypasses rolling code security

原始链接: https://www.rtl-sdr.com/flipperzero-darkweb-firmware-bypasses-rolling-code-security/

针对Flipper Zero设备的最新固件,由Talking Sasquatch在YouTube上演示,对现代车辆构成重大安全威胁。与RollJam等需要干扰信号的先前攻击不同,这种新方法只需捕获*一次*按键,即可完全克隆钥匙遥控器。 该固件利用滚动代码安全系统中的漏洞——被克莱斯勒、福特、现代和斯巴鲁等品牌的车辆使用——通过逆向工程代码序列或利用“RollBack”攻击来操纵同步。一旦克隆成功,原始钥匙遥控器将停止工作。 这种攻击实施起来非常简单,目前除了可能的大规模车辆召回外,还没有可用的修复方法。易于访问和受影响车辆范围广泛,使得这成为车辆安全方面的一个严重问题。

## Flipper Zero 与汽车钥匙漏洞 - 摘要 最近发现的漏洞允许 Flipper Zero 设备绕过许多汽车钥匙遥控器的滚动代码安全机制。通过捕获钥匙遥控器的一个按键信号,该设备可以模拟其所有功能——锁车、解锁和打开后备箱,从而有效地克隆钥匙。重要的是,这次攻击会使原始钥匙遥控器失效。 问题的核心在于许多无钥匙进入系统的设计,特别是那些使用 KeyLoq 的系统,它们依赖于“制造商密钥”进行配对。如果该密钥被泄露,克隆将变得非常简单。虽然干扰和重放攻击是已知的,但这种方法只需要捕获一个信号。 讨论的重点是现代汽车钥匙系统在便利性与安全性之间的权衡,以及制造商实施更安全的解决方案的可能性,例如多因素身份验证或公钥密码学。人们对潜在的滥用行为表示担忧,从骚扰性攻击(禁用钥匙)到帮助车辆盗窃,尽管一些人认为对于窃贼来说,砸窗户等更简单的方法仍然更实用。该漏洞凸显了物联网设备和汽车行业中普遍存在的安全缺陷问题。
相关文章

原文

Over on YouTube Talking Sasquach has recently tested custom firmware for the Flipper Zero that can entirely break the rolling code security system used on most modern vehicles. Rolling code security works by using a synchronized algorithm between a transmitter and receiver to generate a new, unique code for each transmission, preventing replay attacks and unauthorized access.

In the past we've discussed an attack against rolling code security systems called RollJam, which works by jamming the original keyfob signal so the vehicle cannot receive it, and at the same time recording it for later use. However, this attack is difficult to perform in reality.

For this new attack to work, all that is needed is a single button-press capture from the keyfob, without any jamming. Just from that single capture, it is able to emulate all the keyfob's functions, including lock, unlock, and unlock trunk. A consequence of this is that the original keyfob gets out of sync, and will no longer function.

According to the Talking Sasquatch, the attack works by simply reverse engineering the rolling code sequence, either through sequence leaks or prior brute forcing of the sequence from a large list of known codes. However, another article mentions that the firmware is based on the "RollBack" attack, which works by playing back captured rolling codes in a specific order to initiate a 'rollback' of the synchronization system.

Regardless of the method, videos demonstrating the attack show that only a single capture is needed to emulate a keyfob completely.

Affected vehicles include Chrysler, Dodge, Fiat, Ford, Hyundai, Jeep, Kia, Mitsubishi and Subaru. As of yet, there appears to be no easy fix for this, other than mass vehicle recalls.

联系我们 contact @ memedata.com