Security Issues in Nissan’s Mobile App, NissanConnect, Could Potentially Put Users’ Data at Risk
Submitted by Filip Chytry, security expert, seculu.cz
As technology continues to advance, cars are increasingly becoming integrated into our mobile devices. Automotive brands are now releasing mobile apps, allowing users to connect their music streaming services, social networks, and search engines into the car’s system. One app that I’d like to highlight is NissanConnect, a mobile application from Nissan.
I would like to make it clear that issues discussed in this article are not unique to Nissan's app. They can be found in other apps out there. However, since I own a Nissan car, I had the chance to familiarize myself with the brand’s mobile app. I purchased a Nissan several months ago after reading many user reviews and taking into consideration various technological features of the car. Nissan, the car, is great, but I can't say the same thing about NissanConnect, the app. The companies responsible for its Satnav and the mobile app didn't perform sufficient QA testing. In my opinion, the lack of QA resulted in some security holes in the mobile application.
After installing and configuring NissanConnect, I encountered some issues and read more on reviews from other reviews. I found that other app users were also running into some of the same issues that I had. This led me to disassemble the app to take a closer look at what went into the build and the implementation of its security features.
I became unpleasantly surprised by some of the data that are shared with Airbiquity over HTTP protocol. The app has the permission android.permission.GET_ACCOUNTS, which means it can access other logins you have on your device, such as Facebook, Pandora, etc., and all login information that can easily be obtained on rooted devices. I was left disappointed that Nissan/Airbiquity had cast aside the level of security in this app.
I contacted Nissan Customer Support, explained the security concerns I had discovered, and offered to come up with a plan to improve these issues. Unfortunately, for legal reasons, Nissan’s company policy prevents them from accepting technically-related improvements from users.
I feel that it’s imperative for a company to be concerned about user privacy issues, prioritize the level of security available to protect customer data, and consider user feedback. Unfortunately, in this case, I don’t feel that Nissan’s response has reflected this attitude.
My experience with NissanConnect has inspired me to investigate and review additional automotive mobile applications, paying close attention to their security features and permissions. In general, it’s important to keep in mind that many mobile apps we use on a daily basis could carry security risks that intrude into our privacy and personal data.
To get a FREE security audit of your mobile applications, drop us a line firstname.lastname@example.org. We'll hunt and find security holes in your apps for you.
- Custom Made vs. Off-The-Shelf Mobile Apps – The Issue of Security
- You Can Build Apps for the Apple TV, But Do You Know How to Do It Securely?
- We Know Why 85% of Mobile Apps Suck in Security. Do You?
- 7 Reasons Why Testing the Security of Mobile Applications Is Crucial for Enterprises
- The Top 5 Mobile Application Security Issues You Need to Address When Developing Mobile Applications
- What Is a Mobile Application Containerization, or Wrapper, and Why Must It Die?
- Security Is Driving the Adoption of Connected Cars
Most Recent Articles
- TeskaLabs helps LINET with cyber security compliance for medical devices
- TeskaLabs and University hospital in Pilsen launches a pilot of zScanner - open source mobile app for medical photo documentation
- EV Charging Station security demonstrator
- Five Ways AI And Machine Learning Can Enhance Cybersecurity Strategy
- C-ITS ITS-S Security microservice
You Might Be Interested in Reading These Articles
FoxGlove Security researchers published a serious vulnerability that can put millions of application backend, including mobile backend, at risk. Mobile applications use the same web-app technology for their backends, thus suffer the same vulnerability. Mobile application servers are inherently insecure because they consist of extensive stacks of software. Each piece can contain risky zero-day vulnerabilities.
Published on December 15, 2015
What seems to be a Sci-Fi movie with “talking” vehicles and “flying” machines has now become a reality. Automotive companies, seeing huge opportunity and wanting to entice their customers, are rushing to produce more car features so drivers can avoid traffic congestion, plan the next route, check the status of the car, find an available parking space, request for road assistance, or notify friends/family members/business contacts of news.
Published on May 10, 2016
Distributed Denial of Service (DDoS) is a form of cyberattack which makes the target internet service inaccessible. “Distributed” refers to the fact that the attack comes from multiple sources, to have a bigger impact on the target, as it cannot cope with such a large amount of traffic. In recent years, DDoS attacks have become more and more complex, with many combinations of different attach approaches being used.
Published on February 07, 2017