Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Jailbreaking an Electric Vehicle in 2023

Black Hat6,080 views41:03over 2 years ago

The researchers demonstrate a hardware-based attack on Tesla's infotainment system using voltage glitching to bypass secure boot and gain root access. By manipulating the SVI2 bus, they successfully bypassed integrity checks, allowing them to enable soft-locked features like rear seat heaters and extract sensitive car credentials and disk encryption keys from the fTPM. This research highlights the critical need to include physical hardware attacks in threat models for modern automotive systems. The talk provides a detailed walkthrough of the fault injection setup and the subsequent extraction of cryptographic material.

Bypassing Tesla’s Secure Boot: A Masterclass in Hardware Fault Injection

TLDR: Researchers at Black Hat 2023 demonstrated a successful hardware-based attack on Tesla’s AMD-powered infotainment system using voltage glitching to bypass secure boot. By manipulating the SVI2 bus, they gained root access, enabling soft-locked features and extracting sensitive cryptographic material from the fTPM. This research proves that even robust software security can be undermined by physical hardware manipulation, forcing a rethink of automotive threat models.

Modern automotive security is no longer just about CAN bus sniffing or finding an exposed API endpoint. As manufacturers shift toward high-performance computing platforms, the attack surface has migrated from simple embedded controllers to complex, x86-based systems that mirror the architecture of a desktop PC. The recent research presented at Black Hat 2023 regarding Tesla’s AMD-based infotainment system is a stark reminder that when you own the hardware, you eventually own the software.

The Anatomy of the Glitch

The researchers targeted the infotainment and connectivity unit, which serves as the central hub for the vehicle's digital features. Tesla’s implementation relies on a chain of trust that begins with the AMD Secure Processor (ASP) and extends through Coreboot to the Linux kernel. Under normal conditions, this chain is cryptographically verified at every stage. If any component is modified, the boot process halts.

To break this, the team employed voltage glitching—a classic fault injection technique. By momentarily dropping the supply voltage to the SoC during a critical verification window, they induced a fault that caused the processor to skip the instruction responsible for the integrity check.

The setup was surprisingly accessible. Using a Teensy microcontroller to inject packets into the SVI2 bus, they gained direct control over the external voltage regulator. By monitoring the SPI bus for the chip-select signal, they could time the glitch to coincide exactly with the verification of the bootloader.

# Example of the logic analyzer trigger condition
if (chip_select_active && verification_window_open) {
    inject_svi2_voltage_drop(duration=short);
}

This is not a theoretical exercise. The researchers successfully bypassed the secure boot, allowing them to modify the root filesystem. By injecting a known SSH password into the authorized_keys file, they achieved persistent root access.

From Root Access to Cryptographic Extraction

Gaining a root shell is only the beginning. The real value of this research lies in how they handled the fTPM (firmware-based Trusted Platform Module). Tesla uses the fTPM to seal sensitive data, including car credentials and disk encryption keys. These keys are not stored in plaintext; they are derived from a unique chip secret that is inaccessible to the operating system.

The researchers reverse-engineered the key derivation algorithm used by the fTPM. By executing a custom payload during the boot sequence, they were able to leak the seed value required to derive these keys. With the seed and the encrypted non-volatile data extracted from the SPI flash, they could perform the key derivation offline.

This process effectively unsealed the TPM objects. The impact is significant: an attacker with physical access can now extract the unique RSA keys used to authenticate the vehicle against Tesla’s servers. This bypasses the OWASP A07:2021 – Identification and Authentication Failures protections by essentially cloning the vehicle's identity.

Real-World Implications for Pentesters

For those of us conducting penetration tests on modern vehicles, this research changes the game. We can no longer assume that a locked bootloader is an impenetrable wall. If you are tasked with assessing an automotive infotainment system, your scope must include physical hardware analysis.

Look for debug headers, exposed communication buses like I2C or SPI, and voltage regulation points. If the system uses an AMD Ryzen or similar high-performance SoC, the SVI2 bus is a prime target for fault injection. The tools required—a logic analyzer, a microcontroller, and some basic soldering skills—are well within the reach of any competent red team.

Defending Against the Physical

Defending against fault injection is notoriously difficult because it attacks the physical properties of the silicon. However, manufacturers can implement several layers of mitigation. Hardening the boot process against timing attacks, using internal voltage regulation that is less susceptible to external manipulation, and implementing active tamper detection are essential.

Tesla’s response to this research highlights the cat-and-mouse nature of the industry. They have already moved to sign configuration items, meaning that even if you gain root access, you cannot simply toggle features like rear seat heaters without a valid cryptographic signature. This shifts the burden back to the attacker, who must now find a vulnerability in the gateway firmware to achieve the same result.

Hardware security is the new frontier. As we continue to see more powerful computing units integrated into our vehicles, the line between "car hacking" and "desktop exploitation" will continue to blur. Keep your soldering irons hot and your logic analyzers ready; the next big vulnerability is likely sitting on a PCB, waiting for a well-timed glitch.

Talk Type
research presentation
Difficulty
expert
Has Demo Has Code Tool Released


Black Hat USA 2023

118 talks · 2023
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in