Subaru Starlink Vulnerability Exposed Cars to Remote Hacking

4 views 2 minutes read

The Subaru Starlink vulnerability recently made headlines for exposing millions of vehicles to potential remote hacking. This shocking security gap in Subaru’s connected car system, Starlink, left vehicles across the United States, Canada, and Japan open to unauthorized access.

Alarmingly, attackers needed only minimal information, such as a victim’s last name and ZIP code, to control car functions remotely.

This news, first detailed by security experts Shubham Shah and Sam Curry in their report, underscores the urgent need for stronger vehicle cybersecurity measures.

Key Takeaway to Subaru Starlink Vulnerability:

  • This vulnerability highlights the critical need for automakers to prioritize cybersecurity in connected vehicles to protect customer data and safety.

Subaru Starlink Vulnerability Exposed: The Details

What Was the Subaru Starlink Vulnerability?

On November 20, 2024, researchers Shubham Shah and Sam Curry uncovered a major flaw in Subaru’s Starlink system.

Starlink, a feature integrated into Subaru vehicles, enables remote commands like starting or stopping the engine, unlocking doors, and tracking vehicle locations. The vulnerability allowed attackers to:

  • Start, stop, lock, and unlock vehicles remotely.
  • Access a car’s location history from the past year, accurate to within five meters.
  • Retrieve personal information such as customer addresses, phone numbers, and partial credit card details.
  • Access sensitive vehicle data, including odometer readings, sales history, and emergency contacts.

These security flaws raised serious concerns about both user privacy and physical safety.

How Was the Vulnerability Discovered?

The researchers initially explored Subaru’s MySubaru mobile app but found its security robust. However, they uncovered the vulnerability while testing employee-facing admin portals.

A critical oversight in the admin panel’s password reset feature allowed unauthorized access to employee accounts, which provided entry to the Starlink system.

By bypassing two-factor authentication (2FA) and exploiting poorly secured endpoints, they demonstrated how an attacker could control vehicles remotely with only basic personal information.

For example, they tested this flaw on a friend’s Subaru and successfully unlocked the car without any alerts being triggered.

Real-Life Implications of Vehicle Hacking

The Subaru Starlink vulnerability highlights the growing cybersecurity risks in modern cars.

A similar incident occurred in 2015, when a Jeep Cherokee was remotely hacked through its Uconnect system, allowing researchers to control the vehicle’s brakes and engine.

Such cases emphasize the critical need for automakers to address cybersecurity from the design stage to prevent malicious exploitation.

How Subaru Responded

Once notified, Subaru acted swiftly to patch the vulnerability within 24 hours, ensuring that the system was not exploited maliciously.

Their rapid response sets a strong example for other automakers but also highlights the importance of regular audits and robust security protocols for connected systems.

Why Vehicle Cybersecurity Matters More Than Ever

As automakers continue to integrate advanced connectivity features, cybersecurity becomes a pressing concern. Vulnerabilities like Subaru’s Starlink issue expose:

  • Personal safety risks: Unauthorized control of a vehicle could lead to theft, accidents, or even targeted harm.
  • Privacy violations: Detailed location history and personal data breaches can result in identity theft or stalking.
  • Loss of trust: Flaws in connected vehicle systems can damage brand reputation and consumer confidence.

To mitigate these risks, manufacturers must prioritize:

  • Regular penetration testing of connected systems.
  • Robust encryption for data transmission.
  • Real-time monitoring for suspicious activities.
  • Timely software updates to address emerging threats.

What’s Next for Connected Vehicle Security?

The trend toward fully autonomous vehicles means cybersecurity will only grow in importance. With more data collected and transmitted, automakers must:

  • Collaborate with cybersecurity firms to strengthen defenses.
  • Develop transparent policies for user data collection and protection.
  • Educate customers about safe practices, like enabling multi-factor authentication (MFA) where possible.

About Subaru

Subaru Corporation is a renowned automaker known for its reliable vehicles and all-wheel-drive technology.

Headquartered in Japan, Subaru is a global leader in connected car innovation, with features like the Starlink system enhancing vehicle functionality and convenience.

Rounding Up

The Subaru Starlink vulnerability serves as a stark reminder of the cybersecurity challenges in today’s connected vehicles.

While Subaru’s swift response minimized potential damage, the incident underscores the need for automakers to adopt a proactive approach to security. As vehicles become more advanced, ensuring customer safety and data privacy must remain a top priority.


FAQs

What is the Subaru Starlink vulnerability?

  • It’s a security flaw in Subaru’s Starlink system that allowed unauthorized access to vehicles and customer data.

Which regions were affected by this vulnerability?

  • The issue impacted vehicles in the United States, Canada, and Japan.

What could attackers do with this vulnerability?

  • Attackers could remotely start, stop, lock, or unlock vehicles, access location history, and retrieve sensitive customer data.

How did Subaru respond to the vulnerability?

  • Subaru patched the vulnerability within 24 hours of being notified and ensured it was not exploited maliciously.

What steps can automakers take to prevent such vulnerabilities?

  • Automakers should conduct regular security audits, implement robust encryption, and collaborate with cybersecurity experts to protect their systems.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2025 – All Right Reserved | Designed & Powered by VexaPlus Technologies

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More