A Honda Vulnerability Allows Hackers to Use a Replay Attack

In a replay attack, a hostile hacker may trick a website or service into granting them access to your account by reusing the information that the website or service uses to identify you.

If a hacker is able to locate and repeat a certain string of information, he might possibly use it to fool a website into believing that was indeed you, so gaining access to your online account.

What Happened?

According to a few researchers, a ‘replay attack’ vulnerability has been discovered in some Honda and Acura automobiles. This weakness enables a nearby hacker to unlock your vehicle and even start its engine from a short distance.

Attackers capture the radio frequency (RF) signals delivered from your key fob to the automobile and resend them in order to gain control of your car’s remote keyless entry system, according to researchers.

Attackers could use the CVE-2022-27254, to launch a Man-in-the-Middle (MitM) attack, or more specifically a replay attack, in which they intercepted and modified the RF signals normally sent from a remote key fob to the car, and then re-sent these signals at a later time in order to unlock the car at their discretion.

Blake Berry, Hong Liu and Ruolin Zhou of

Read More: https://heimdalsecurity.com/blog/a-honda-vulnerability-allows-hackers-to-use-a-replay-attack/