Fiat Chrysler recalls thousands Jeep Renegade SUVs due to hacking risks

Fiat Chrysler has recalled nearly 8,000 Jeep Renegade SUVs in the US to update the software that could be exploited by attackers to hack the vehicles.

No peace for Fiat Chrysler Automobiles after the disclosure of the attack against its Jeep Cherokee model made by the popular hackers Charlie Miller and Chris Valasek. The duo of experts demonstrated how to hack the Fiat Chrysler connected car remotely by exploiting a flaw in the Uconnect automobile system.

A few days later the US National Highway Traffic Safety Administration recalled 1.4 million vehicles to update the flawed software hacked by the security experts. Fiat Chrysler was providing firmware updates available for download on its website and by mail a Flash USB containing the update to its customers. Just yesterday I was writing about this disconcerting decision of the company for providing a software update via Mailed USB explaining the possible risks for the car owners.

Fiat Chrysler USB stickFiat Chrysler USB stick

News of the day is that Fiat Chrysler has recalled nearly 8,000 SUVs  to fix the flaws that could allow remote attackers to hack the connected car.

Fiat Chrysler explained it needed to apply software updates to 7,810 Jeep Renegades that were sold in the US market, it also added that some models of the SUV sold in 2015, which comes loaded with certain radios, were vulnerable to the attack.

Resuming this campaign involves SUV equipped with radios different from the one hacked by the experts, anyway Fiat Chrysler states that it is unaware of any injuries related to software exploitation.

“The campaign – which involves radios that differ from those implicated in another, similar recall – is designed to protect connected vehicles from remote manipulation. If unauthorised, such interference constitutes a criminal act.

FCA US has already applied measures to prevent the type of vehicle manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems.

The company is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents – independent of the media demonstration.” states the statement issued by Fiat Chrysler on the software update.

The automaker added that more that 50 percent of the SUVs needing the software update remained at dealerships across the US, this circumstance allows the company to update the vehicle before being sold to customers.

Fiat Chrysler added that owners of 2015 Jeep Renegade SUVs, equipped with 6.5-inch touchscreens, will be sent a USB device containing the update for the flawed software, alternately customers can download it from the official website. The good news for customers is that there is no charge for the software or, in the case of dealer visit, installation as reported in the statement:

“Affected are certain 2015 Jeep Renegade SUVs equipped with 6.5-inch touchscreens. Customers will receive a USB device which they may use to upgrade vehicle software. This provides additional security features.

Alternately, customers may visit http://www.driveuconnect.com/software-update/ as early as today to input their Vehicle Identification Numbers (VINs) and determine if their vehicles are included in the recall. If so, they may download the software themselves or, as early as Sept. 5, visit their dealers where technicians will perform the installation.

There is no charge for the software or, in the case of dealer visit, installation.”

The automaker explained it was recalling the cars “out of an abundance of caution,” but car hacking is a scaring reality, and let me add that the measure adopted by Fiat Chrysler are a must for the safety and the security of its customers.

About the Authors Elsio Pinto

Elsio Pinto (@high54security) is at the moment the Lead McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog http://high54security.blogspot.com/

and Pierluigi Paganini

(Security Affairs – Fiat Chrysler, Patch Management)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Victoria’s Secret ‘s website offline following a cyberattack

Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…

17 hours ago

China-linked APT41 used Google Calendar as C2 to control its TOUGHPROGRESS malware

Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…

21 hours ago

New AyySSHush botnet compromised over 9,000 ASUS routers, adding a persistent SSH backdoor.

GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…

1 day ago

Czech Republic accuses China’s APT31 of a cyberattack on its Foreign Ministry

The Czech government condemned China after linking cyber espionage group APT31 to a cyberattack on…

2 days ago

New PumaBot targets Linux IoT surveillance devices

PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…

2 days ago

App Store Security: Apple stops $2B in fraud in 2024 alone, $9B over 5 years

Apple blocked over $9B in fraud in 5 years, including $2B in 2024, stopping scams…

2 days ago