Security researcher Eaton Zveare has shared a finding with TechCrunch, which revealed serious vulnerabilities in a centralized dealership web portal of an unnamed major carmaker. The flaws exposed sensitive customer and vehicle data and could have allowed hackers to perform nefarious actions like unwanted remote control and hijacking.

Portal Flaw Lets Hackers Hijack Cars Remotely

It’s detailed that the security flaws related to “two weak API authentications” allowed Zveare to bypass login security on the web portal and create an unrestricted national-level admin account by modifying some browser-loaded code, without needing valid credentials.

Subsequently, this granted the created account access to over 1,000 dealership systems in the United States. The dealership portal is reportedly the same platform that employees and associates are authorized to access for viewing customer and vehicle information. What’s worse is that the portal’s single sign-on could enable users to jump between different dealer systems.

Once access was gained, Zveare said that it was very easy for someone with an unrestricted account to search for a customer’s name and match it with the vehicle’s information through an internal tool. Likewise, it was possible to check a car in a parking lot and look up its owner.

However, what’s more concerning is that vehicles with a connected mobile account pose a greater risk of attacks and hijacks. Zveare told the outlet that admins could control or transfer user accounts without security authentication.

He demonstrated how the exploit could work in a real-world scenario. Through permission from a friend with a vehicle in the portal, the researcher was able to remotely control it, such as by unlocking the car via the mobile app. This has serious implications in instances of organized carjacking and theft.

Major Security Bug Was Fixed

Zveare did not disclose which carmaker this was. However, it is said to be a well-known vendor with multiple sub-brands. It was also not known if the security flaws affected comparable portals of this carmaker outside the U.S., though there might be potential similar loopholes in overseas subsidiaries.

Close-up of a Kia logo on a vehicle's front grille.
Kia was affected by a similar system bug in 2024 that allowed attackers to control the vehicles using license plates. / © Jonathan Weiss / Shutterstock.com Image source: Jonathan Weiss / Shutterstock.com

Additionally, Zveare stated that this discovery was reported to the vendor in February and that the bugs were patched within a week. While there was no evidence of prior exploitation in the wild, this was very alarming nonetheless.

This is not the only case where a carmaker was the reason for major security vulnerabilities. Last year, researchers exploited Kia‘s dealer portal to remotely control vehicles using license plate numbers. Meanwhile, Volkswagen was reported to have exposed the personal data of more than 800,000 EV owners.

In your case, what safeguards can you suggest to help protect your data and your vehicle from hacking? Should we really trust these companies with our data? We want to hear your answers in the comments.