Tesla’s Key Fob Cloning Attack Takes Just 1.6 Seconds with $600 in radio and computing equipment that wirelessly read signals from a nearby Tesla owner’s fob. Tesla paid the KU Leuven team a $10,000 bounty and plans to add the researchers’ names to its Hall of Fame. The team reported the issue to Tesla last year, but the company addressed it in June 2018 by upgrading the weak encryption. Tesla was criticised on Twitter for using a weak cipher, though one of the researchers appreciated Tesla for quickly responding to their report and fixing the issue.
Source: https://thehackernews.com/2018/09/tesla-model-s-remote-hack.html

