Test drive on Tesla Model S and Model 3 reveals vulnerability to GPS spoofing attacks

Regulus Cyber research has claimed that Tesla’s Model S and Model 3 are vulnerable to GPS spoofing attacks.

A test drive on Tesla Model 3 using the Navigate on Autopilot mode conducted by Regulus Cyber started with the car driving normally and the autopilot navigation feature activated, Regulus Cyber said. The vehicle maintained a constant speed and position in the middle of the lane.

The spoofing attack was started when the car was 3 miles away from the planned exit when the spoofing attack began, the research firm said. The vehicle reacted as if the exit was just 500 feet away, immediately slowed down, activated the right turn signal, and made a sharp turn off the main road.

“Until now, awareness of cybersecurity issues with GNSS and sensors has been limited in the automotive industry. But as dependency on GNSS is on the rise, there's a real need to bridge the gap between its tremendous inherent benefits and its potential hazards. It's crucial today for the automotive industry to adopt a proactive approach towards cybersecurity,” said Yoav Zangvil, Regulus Cyber CTO and co-founder.

While the test has been performed on Model S and Model 3, Regulus Cyber researchers concluded that the vulnerability of Tesla’s GNSS (global navigation satellite systems, also known as GPS) is most likely company-wide since same chipsets are used across its fleet.