Fiat Chrysler recalls thousands Jeep Renegade SUVs due to hacking risks

Fiat Chrysler has recalled nearly 8,000 Jeep Renegade SUVs in the US to update the software that could be exploited by attackers to hack the vehicles.

No peace for Fiat Chrysler Automobiles after the disclosure of the attack against its Jeep Cherokee model made by the popular hackers Charlie Miller and Chris Valasek. The duo of experts demonstrated how to hack the Fiat Chrysler connected car remotely by exploiting a flaw in the Uconnect automobile system.

A few days later the US National Highway Traffic Safety Administration recalled 1.4 million vehicles to update the flawed software hacked by the security experts. Fiat Chrysler was providing firmware updates available for download on its website and by mail a Flash USB containing the update to its customers. Just yesterday I was writing about this disconcerting decision of the company for providing a software update via Mailed USB explaining the possible risks for the car owners.

News of the day is that Fiat Chrysler has recalled nearly 8,000 SUVs  to fix the flaws that could allow remote attackers to hack the connected car.

Fiat Chrysler explained it needed to apply software updates to 7,810 Jeep Renegades that were sold in the US market, it also added that some models of the SUV sold in 2015, which comes loaded with certain radios, were vulnerable to the attack.

Resuming this campaign involves SUV equipped with radios different from the one hacked by the experts, anyway Fiat Chrysler states that it is unaware of any injuries related to software exploitation.

“The campaign – which involves radios that differ from those implicated in another, similar recall – is designed to protect connected vehicles from remote manipulation. If unauthorised, such interference constitutes a criminal act.

FCA US has already applied measures to prevent the type of vehicle manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems.

The company is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents – independent of the media demonstration.” states the statement issued by Fiat Chrysler on the software update.

The automaker added that more that 50 percent of the SUVs needing the software update remained at dealerships across the US, this circumstance allows the company to update the vehicle before being sold to customers.

Fiat Chrysler added that owners of 2015 Jeep Renegade SUVs, equipped with 6.5-inch touchscreens, will be sent a USB device containing the update for the flawed software, alternately customers can download it from the official website. The good news for customers is that there is no charge for the software or, in the case of dealer visit, installation as reported in the statement:

“Affected are certain 2015 Jeep Renegade SUVs equipped with 6.5-inch touchscreens. Customers will receive a USB device which they may use to upgrade vehicle software. This provides additional security features.

Alternately, customers may visit http://www.driveuconnect.com/software-update/ as early as today to input their Vehicle Identification Numbers (VINs) and determine if their vehicles are included in the recall. If so, they may download the software themselves or, as early as Sept. 5, visit their dealers where technicians will perform the installation.

There is no charge for the software or, in the case of dealer visit, installation.”

The automaker explained it was recalling the cars “out of an abundance of caution,” but car hacking is a scaring reality, and let me add that the measure adopted by Fiat Chrysler are a must for the safety and the security of its customers.

About the Authors Elsio Pinto

Elsio Pinto (@high54security) is at the moment the Lead McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog McAfee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog http://high54security.blogspot.com/

and Pierluigi Paganini

(Security Affairs – Fiat Chrysler, Patch Management)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.