{"id":35328,"date":"2025-08-19T22:57:19","date_gmt":"2025-08-19T11:57:19","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=35328"},"modified":"2025-08-19T23:02:50","modified_gmt":"2025-08-19T12:02:50","slug":"perfektblue-bluetooth-car-hack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/perfektblue-bluetooth-car-hack\/35328\/","title":{"rendered":"Car hacking via Bluetooth"},"content":{"rendered":"<p>Cars these days are effectively computers on wheels \u2014 making them targets for cybercriminals: <a href=\"https:\/\/www.cnbc.com\/2022\/09\/08\/tiktok-challenge-spurs-rise-in-thefts-of-kia-hyundai-cars.html\" target=\"_blank\" rel=\"nofollow noopener\">theft<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/car-hacking-rsac-2016\/11551\/\" target=\"_blank\" rel=\"noopener nofollow\">unauthorized activation of on-board equipment<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/jeep-hacked-again\/12752\/\" target=\"_blank\" rel=\"noopener nofollow\">remote braking and steering<\/a>, and <a href=\"https:\/\/www.kaspersky.com\/blog\/tracking-and-hacking-kia-cars-via-internet\/52497\/\" target=\"_blank\" rel=\"noopener nofollow\">spying on drivers and passengers<\/a> are all perfectly doable by the bad guys. But carrying out such attacks often requires either physical access to the vehicle or remote access to its telematics systems (that is, hijacking communications with the carmaker\u2019s server over the cellular network). However, a recent <a href=\"https:\/\/perfektblue.pcacybersecurity.com\/\" target=\"_blank\" rel=\"nofollow noopener\">study<\/a> by PCA Cyber Security describes a new hacking method that targets the car\u2019s infotainment system via Bluetooth. The four vulnerabilities in question \u2014 collectively named PerfektBlue \u2014 are unlikely to lead to widespread car thefts or hacks, but it\u2019s still worth knowing about them and exercising caution.<\/p>\n<h2>Under the hood of PerfektBlue<\/h2>\n<p>If your car was made within the last 10 years, no doubt it lets you connect your smartphone via Bluetooth to make hands-free calls or listen to music. The infotainment system is a part of the head unit, and it uses a built-in Bluetooth chip and special software to work. The software of choice for many carmakers is OpenSynergy Blue SDK. According to its developers, Blue SDK is used in 350 million vehicles made by Ford, Mercedes-Benz, Skoda, Volkswagen, and others.<\/p>\n<p>PCA Cyber Security discovered four vulnerabilities in Blue SDK (CVE-2024-45431, CVE-2024-45432, CVE-2024-45433, CVE-2024-45434) which, when used together, could allow an attacker to run malicious code in the system. To do so, they\u2019d need to be connected to the car via Bluetooth, which means pairing a device. If successful, the attacker can send malicious commands to the car using the Audio\/Video Remote Control Profile (AVCRP) for Bluetooth. This causes an error in the head unit\u2019s operating system, giving the hacker the same Bluetooth permissions as the carmaker\u2019s software. Armed with these permissions, the attacker can theoretically track the vehicle\u2019s location, eavesdrop through the car\u2019s built-in microphones, as well as steal data from the head unit, such as the victim\u2019s address book. Depending on the digital architecture of the car, the CAN bus for communication between electronic control units (ECUs) may get compromised \u2014 allowing an intruder to take over essential functions such as braking.<\/p>\n<h2>Practical questions about PerfektBlue<\/h2>\n<p><strong>How to spot and prevent this attack?<\/strong> This depends on how Bluetooth is implemented in your particular vehicle. In some rare cases, the in-car infotainment system may not require any driver\/passenger confirmation at all \u2014 leaving Bluetooth open to third-party connections. If so, there\u2019s no way to stop an attack (!). Most cars however require the driver to confirm a connection to a new device, so a driver will see an unexpected connection request. If the request is denied, the attack will fail. The car may even automatically deny connection if the driver has not explicitly enabled pairing mode in the settings. If that applies to your car, attackers will have a job on their hands.<\/p>\n<p><strong>How to determine if your car is vulnerable? <\/strong>Unfortunately, makers tend not to disclose information about vehicle components \u2014 let alone the software inside them. Therefore, the only reliable way is to contact a branded dealer or specialized car service where they can check the head unit and advise on whether new firmware is available that eliminates the vulnerabilities. The researchers themselves experimented (and successfully exploited the vulnerabilities) on the head units of a Volkswagen ID.4 (infotainment system: MEB ICAS3), a Mercedes-Benz (NTG6) and a Skoda Superb (MIB3).<\/p>\n<p><strong>How to protect your car and yourself?<\/strong> The best advice is to update the head unit firmware to a patched version. Although OpenSynergy <a href=\"https:\/\/www.opensynergy.com\/perfektblue\/\" target=\"_blank\" rel=\"nofollow noopener\">released software updates back in September 2024<\/a>, these must first be applied by the manufacturer of the head unit, and only then by the carmaker. The latter must also distribute the new firmware across its dealer network. Therefore, some vulnerable cars may still be lacking new firmware.<\/p>\n<p>The second reliable method of protection is to disable in-car Bluetooth.<\/p>\n<p><strong>What\u2019s the attack range?<\/strong> With standard Bluetooth hardware, the attack range is limited to 10 meters, but special amplifiers (range extenders) can extend this to 50\u2013100 meters. If a vehicle is equipped with 4G cellular network technology, then after the first phase of the attack, which requires Bluetooth, threat actors can theoretically maintain control over the car via the cellular network.<\/p>\n<p><strong>Is it true the engine must be on for the attack to work?<\/strong> This limitation was reported by Volkswagen, but in practice almost all cars allow you to turn on the infotainment system together with Bluetooth while the ignition is off. Therefore, a running engine is not an attack precondition.<\/p>\n<p><strong>What should carmakers do to improve protection against such attacks?<\/strong> Car manufacturers should adopt the Secure by Design approach. Kaspersky, together with manufacturers of head units and automotive electronics, is <a href=\"https:\/\/os.kaspersky.com\/blog\/how-cyber-immunity-will-change-the-auto-industry\/\" target=\"_blank\" rel=\"noopener nofollow\">creating a line of Cyber Immune solutions based on KasperskyOS<\/a> that keep the system protected and running even if a vulnerable component is attacked. But given the long development and testing cycles in the automotive industry, it will be several more years before Cyber Immune cars hit the roads.<\/p>\n<blockquote><p>More case studies of car hacking through vulnerabilities in electronic systems:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-smart-car-alarm-systems\/26014\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Hacking smart-car alarm systems<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-tesla-model-x\/17874\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Tesla hacks<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/vw-hack\/12784\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>A universal VW key, just $40<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/blackhat-jeep-cherokee-hack-explained\/9493\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Black Hat USA 2015: The full story of how that Jeep was hacked<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/jeep-hacked-again\/12752\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>How that Jeep was hacked. Again<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Be careful what you connect to your in-car infotainment system.<\/p>\n","protected":false},"author":2722,"featured_media":35327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2646],"tags":[381,651,1027,82,43,268],"class_list":{"0":"post-35328","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bluetooth","9":"tag-cars","10":"tag-connected-devices","11":"tag-hacking","12":"tag-privacy","13":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/perfektblue-bluetooth-car-hack\/35328\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/perfektblue-bluetooth-car-hack\/29457\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/perfektblue-bluetooth-car-hack\/24565\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/perfektblue-bluetooth-car-hack\/12742\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/perfektblue-bluetooth-car-hack\/29398\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/perfektblue-bluetooth-car-hack\/28480\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/perfektblue-bluetooth-car-hack\/31340\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/perfektblue-bluetooth-car-hack\/29993\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/perfektblue-bluetooth-car-hack\/40315\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/perfektblue-bluetooth-car-hack\/13713\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/perfektblue-bluetooth-car-hack\/54159\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/perfektblue-bluetooth-car-hack\/23110\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/perfektblue-bluetooth-car-hack-2\/24166\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/perfektblue-bluetooth-car-hack\/32596\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/perfektblue-bluetooth-car-hack\/29585\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/perfektblue-bluetooth-car-hack\/34960\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/cars\/","name":"Cars"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/35328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=35328"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/35328\/revisions"}],"predecessor-version":[{"id":35330,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/35328\/revisions\/35330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/35327"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=35328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=35328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=35328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}