Security Issues in Nissan’s Mobile App, NissanConnect, Could Potentially Put Users’ Data at Risk

Submitted by Filip Chytry, security expert, seculu.cz

As technology continues to advance, cars are increasingly becoming integrated into our mobile devices. Automotive brands are now releasing mobile apps, allowing users to connect their music streaming services, social networks, and search engines into the car’s system. One app that I’d like to highlight is NissanConnect, a mobile application from Nissan.

I would like to make it clear that issues discussed in this article are not unique to Nissan's app. They can be found in other apps out there. However, since I own a Nissan car, I had the chance to familiarize myself with the brand’s mobile app. I purchased a Nissan several months ago after reading many user reviews and taking into consideration various technological features of the car. Nissan, the car, is great, but I can't say the same thing about NissanConnect, the app. The companies responsible for its Satnav and the mobile app didn't perform sufficient QA testing. In my opinion, the lack of QA resulted in some security holes in the mobile application.

nissan app review

After installing and configuring NissanConnect, I encountered some issues and read more on reviews from other reviews. I found that other app users were also running into some of the same issues that I had. This led me to disassemble the app to take a closer look at what went into the build and the implementation of its security features.

nissan code

nissan app

I became unpleasantly surprised by some of the data that are shared with Airbiquity over HTTP protocol. The app has the permission android.permission.GET_ACCOUNTS, which means it can access other logins you have on your device, such as Facebook, Pandora, etc., and all login information that can easily be obtained on rooted devices. I was left disappointed that Nissan/Airbiquity had cast aside the level of security in this app.

I contacted Nissan Customer Support, explained the security concerns I had discovered, and offered to come up with a plan to improve these issues. Unfortunately, for legal reasons, Nissan’s company policy prevents them from accepting technically-related improvements from users.

I feel that it’s imperative for a company to be concerned about user privacy issues, prioritize the level of security available to protect customer data, and consider user feedback. Unfortunately, in this case, I don’t feel that Nissan’s response has reflected this attitude.

My experience with NissanConnect has inspired me to investigate and review additional automotive mobile applications, paying close attention to their security features and permissions. In general, it’s important to keep in mind that many mobile apps we use on a daily basis could carry security risks that intrude into our privacy and personal data.

To get a FREE security audit of your mobile applications, drop us a line support@teskalabs.com. We'll hunt and find security holes in your apps for you.

Additional reading:

  1. Custom Made vs. Off-The-Shelf Mobile Apps – The Issue of Security
  2. You Can Build Apps for the Apple TV, But Do You Know How to Do It Securely?
  3. We Know Why 85% of Mobile Apps Suck in Security. Do You?
  4. 7 Reasons Why Testing the Security of Mobile Applications Is Crucial for Enterprises
  5. The Top 5 Mobile Application Security Issues You Need to Address When Developing Mobile Applications
  6. What Is a Mobile Application Containerization, or Wrapper, and Why Must It Die?
  7. Security Is Driving the Adoption of Connected Cars



You Might Be Interested in Reading These Articles

Industrial IoT Security: Cyber Security Implications for IT-OT Convergence

In June 2017, two information security firms researching the 2016 hack of the electricity grid in Ukraine announced that they had identified the malicious code used to shut down power stations and leave thousands of households and businesses in darkness for several hours. The malware used to target the Kiev power grid has been named Industroyer, and it serves as a sobering reminder about the dangers faced by the Industrial Internet of Things (IIoT).

Continue reading ...

security iot

Published on September 05, 2017

How TeskaLabs Helped O2 Improve Customer Satisfaction of eKasa Point-of-Sale (POS), the Most Successful POS Product / Mobile Cash Register on the Czech Market

In 2016 the Czech government introduced a new law that required businesses to report their sales and provide Electronic Evidence of Sales (EET). This law calls for the adoption of a more modern point-of-sale system that enables businesses to meet regulatory requirements set forth under this law. During the next two years, the law will gradually impact more than three hundred thousand companies in the Czech Republic. O2, the largest integrated telecommunications provider in the Czech market, observed that many would need help complying with this law, maintaining data security and demanding excellent customer support.

Continue reading ...

security case-study pos

Published on August 08, 2017

4 Common Mobile Point of Sale (POS) Security Issues Affecting Retailers That POS Providers Need to Act On

As mobile point-of-sale applications and systems are picking up speed at retailers around the world replacing traditional one, they become appealing targets for cybercriminals allured by the amount of consumer data entered in POS systems whether through unauthorized access, mobile malware or hacking the backend.

Continue reading ...

security mobile pos

Published on January 03, 2017