Careers Form

" " indicates required fields

First name* 
Last name* 
This field is hidden when viewing the form
Max. file size: 256 MB.
Max. file size: 256 MB.
Untitled

We're committed to protect your privacy. C2A Security uses the information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy .

Office Administrator

  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo

CAN Injection: A Rising Threat to Auto Security

  • Category: Research & Trends
  • July 15, 2023

By David Mor-Ofek, Head of Product

A New Era of High-Tech Car Theft

Imagine your car being stolen through your headlight. Sounds like a fictional tale from a sci-fi movie, right? Well, in today’s day and age, it’s much closer to reality than you’d like. This story begins with Ian Tabor, a cybersecurity researcher, who lost his vehicle through this exact scenario. The thieves hadn’t hot-wired his car or smashed the window. Instead, they had tampered with his car’s headlight, leading to a high-tech hack that revealed an alarming vulnerability in his Toyota Rav4 vehicle, and millions of others.

The Nerve Centre: Exploring the CAN Bus

Central to this issue is the Controller Area Network (CAN bus). This communication network, akin to a car’s nervous system, connects various electronic components, ensuring everything from engine management to power steering functions seamlessly.

If this system is compromised, it can lead to grave consequences including theft and tampering with safety systems. Disturbingly, numerous components in vehicles such as Ian’s –  headlight, stereo, and in-car entertainment system can serve as potential entry points for hackers to access the CAN bus.

Oversights in Vehicle Security

The main reason for Ian’s situation was with the way the car was made by the car maker (OEM). There are many different companies, suppliers, and teams involved in the product lifecycle of a vehicle – from design, to development, testing, production, and post-production, and in this case, the car maker didn’t pay enough attention to the risk of the car’s CAN bus being accessed from outside the vehicle. It was important for someone to realize that the CAN bus was too physically close to a point on the car where it could be accessed from outside, like the headlights. This incident indicates that there’s a clear disconnect between teams, a gap between how the development of the vehicle was planned and how it actually works in practice.

Strategies to Strengthen Your Security Posture

To combat this issue, car makers need to:

  • Integrate robust security practices and tool in their product development lifecycle
  • Implement a detailed Threat Analysis and Risk Assessment (TARA) during design and development phases to identify security risks.
  • Leverage automation tools, as DevSecOps solutions, to foster collaboration among teams, and with external suppliers.
  • Employ better fuzzing practices and improve vulnerability management to detect potential issues like this CAN bus vulnerability before the production phase.

EVSec Platform connects risk information (TARA) with data layers, a unique approach for BOM & Vulnerability Management. By leveraging this connection, users can incorporate BOM and HW BOM data layers directly into the cyber model and the system design threat modeling information, gaining visibility into the impact of different systems found in the BOM and their effect on the overall risk profile of the project.

EVSec cyber model approach enables delegation of specific systems and sub-systems within the model to different stakeholders, whether teams in the organization or suppliers, while also providing the ability to monitor the progress of various tasks such as BOM information ingestion, open event remediations, patch versioning, and more. EVSec further supports management through its intuitive dashboard providing an overview of projects and actionable items. This increases transparency and enables communication between teams and stakeholders, ensuring prompt attention to tasks and projects requiring immediate action.

Turning Security to a Business Value Multiplier

EVSec Platform is the first and only mobility-centric DevSecOps Platform. We empower customers to develop new software-based revenue streams and release more secure products, while adhering to existing and evolving regulations and standards. Click here to schedule a demo with our team.

More articles that might interest you:
Industrial Robots at a factory

The Importance of Cybersecurity in Industrial Robotics: Protecting the Smart Manufacturing Floor

May 8, 2025

Critical Care: 2025 Hospital Cybersecurity Readiness Against Increased Medical Device Management Systems (MDMS) Threats

April 28, 2025
US House Committee Hearing: End the Typhoons. March 5, 2025 (Source: YouTube)

High Voltage: Strengthening U.S. Cyber Defenses Against Battery Energy Storage System (BESS) Threats

April 21, 2025

Follow Us

  • linkedin hover LinkedIn
  • Twitter
  • Facebook
Join our newsletter
  • linkedin hover LinkedIn
  • Twitter
  • Facebook
  • © 2025 All rights reserved C2A-SEC LTD 
  • Privacy Policy
Facebook-f Linkedin
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo
  • Products
    • EVSec Platform
    • EVSec Analysis
    • EVSec BOM & Vulnerability Management
    • EVSec Attacker
    • EVSec Network & Endpoint Protection
    • EVSec SOC Enrichment & Analytics
    • EVSec AutoSynth AI
  • Use Cases
    • Medical and Healthcare
  • Integrations
  • Blog
  • Company
    • About
    • Events
    • Careers
  • Contact
  • Schedule a Demo