Hackers can seize control of Xiaomi scooters by exploiting security flaw

The Xiaomi M365 can be made to speed up or slow down by attackers

Hacker in the dark

A security flaw in a Xiaomi electric scooter used by ridesharing companies can be attacked by hackers to accelerate or brake the machine.

According to security researchers at Zimperium, an attacker only has to be within 100 meters of such a vehicle to carry out the hack. Researchers released a proof-of-concept (PoC) for the attack, which impacts Xiaomi M365 scooters.

The PoC enabled researchers to mount a denial-of-service attack and install malicious firmware that can take control of the scooter's acceleration and braking capacities.

The problem starts with the use of Bluetooth by the scooter. The Bluetooth access allows the user to interact with the scooter for multiple features such as an Anti-Theft System, Cruise-Control, Eco Mode and updating the scooter's firmware. To access those features the user can use a dedicated app, and every scooter is protected by a password that can be changed by the user.

"During our research, we determined the password is not being used properly as part of the authentication process with the scooter and that all commands can be executed without the password. The password is only validated on the application side, but the scooter itself doesn't keep track of the authentication state," said the researchers in a blog post.

They added that these features can be used without the need for authentication. Researchers released a video showing how the PoC could lock a scooter by using its anti-theft feature without authentication or the user's consent.

Researchers have contacted Xiaomi which confirmed that it is a known issue internally but gave no clue as to when the problem would be fixed. As a temporary mitigation, researchers said users should connect their mobile app to the scooter before use and keep the app connected, as would-be attackers wouldn't be able to then remotely flash malicious malware or lock a scooter. 

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

What is DevSecOps and why is it important?
Security

What is DevSecOps and why is it important?

30 Oct 2020
Weekly threat roundup: NHS COVID-19 app, Nvidia, and Oracle
Security

Weekly threat roundup: NHS COVID-19 app, Nvidia, and Oracle

30 Oct 2020
Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020

Most Popular

Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
What is Neuralink?
Technology

What is Neuralink?

24 Oct 2020
Hackers demand ransom from therapy patients after clinic data breach
Security

Hackers demand ransom from therapy patients after clinic data breach

27 Oct 2020