Quick References

High level and sub-level descriptions of vulnerability/ threat Example of vulnerability or attack method
Threats regarding back-end servers related to vehicles in the field 1 Back-end servers used as a means to attack a vehicle or extract data 1.1 Abuse of privileges by staff (insider attack)
1.2 Unauthorized internet access to the server (e.g., backdoors, unpatched system software vulnerabilities, SQL attacks)
1.3 Unauthorized physical access to the server (e.g., USB sticks or other media)
2 Services from back-end server being disrupted, affecting the operation of a vehicle 2.1 Attack on back-end server stops it functioning, for example it prevents it from interacting with vehicles and providing services they rely on
3 Services from back-end server being disrupted, affecting the operation of a vehicle 3.1 Abuse of privileges by staff (insider attack)
3.2 Loss of information in the cloud. Sensitive data may be lost due to attacks or accidents when data is stored by third-party cloud service providers
3.3 Unauthorized internet access to the server (enabled for example by backdoors, unpatched system software vulnerabilities, SQL attacks or other means)
3.4 Unauthorized physical access to the server (conducted for example by USB sticks or other media connecting to the server)
3.5 Information breach by unintended sharing of data (e.g. admin errors)
Threats to vehicles regarding their communication channels 4 Spoofing of messages or data received by the vehicle 4.1 Spoofing of messages by impersonation (e.g. 802.11p V2X during platooning, GNSS messages, etc.)
4.2 Sybil attack (in order to spoof other vehicles as if there are many vehicles on the road)
5 Communication channels used to conduct unauthorized manipulation, deletion or other amendments to vehicle held code/data 5.1 Communications channels permit code injection, for example tampered software binary might be injected into the communication stream
5.2 Communications channels permit manipulation of vehicle held data/code
5.3 Communications channels permit overwrite of vehicle held data/code
5.4 Communications channels permit erasure of vehicle held data/code
5.5 Communications channels permit introduction of data/code to the vehicle (write data/code)
6 Communication channels permit untrusted/unreliable messages to be accepted or are vulnerable to session hijacking/replay attacks 6.1 Accepting information from an unreliable or untrusted source
6.2 Man in the middle attack/session hijacking
6.3 Replay attack, for example an attack against a communication gateway allows the attacker to downgrade software of an ECU or firmware of the gateway
7 Information can be readily disclosed. For example, through eavesdropping on communications or through allowing unauthorized access to sensitive files or folders 7.1 Interception of information / interfering radiations / monitoring communications
7.2 Gaining unauthorized access to files or data
8 Denial of service attacks via communication channels to disrupt vehicle functions 8.1 Sending a large number of garbage data to vehicle information system, so that it is unable to provide services in the normal manner
8.2 Black hole attack, in order to disrupt communication between vehicles the attacker is able to block messages between the vehicles
9 An unprivileged user is able to gain privileged access to vehicle systems 9.1 An unprivileged user is able to gain privileged access, for example root access
10 Viruses embedded in communication media are able to infect vehicle systems 10.1 Virus embedded in communication media infects vehicle systems
11 Messages received by the vehicle (for example X2V or diagnostic messages), or transmitted within it, contain malicious content 11.1 Malicious internal (e.g. CAN) messages
11.2 Malicious V2X messages, e.g. infrastructure to vehicle or vehicle-vehicle messages (e.g. CAM, DENM)
11.3 Malicious diagnostic messages
11.4 Malicious proprietary messages (e.g. those normally sent from OEM or component/system/function supplier)
Threats to vehicles regarding their update procedures 12 Misuse or compromise of update procedures 12.1 Compromise of over the air software update procedures. This includes fabricating the system update program or firmware
12.2 Compromise of local/physical software update procedures. This includes fabricating the system update program or firmware
12.3 The software is manipulated before the update process (and is therefore corrupted), although the update process is intact
12.4 Compromise of cryptographic keys of the software provider to allow invalid update
13 It is possible to deny legitimate updates 13.1 Denial of Service attack against update server or network to prevent rollout of critical software updates and/or unlock of customer specific features
Threats to vehicles regarding unintended human actions facilitating a cyber attack 15 Legitimate actors are able to take actions that would unwittingly facilitate a cyber-attack 15.1 Innocent victim (e.g. owner, operator or maintenance engineer) being tricked into taking an action to unintentionally load malware or enable an attack
15.2 Defined security procedures are not followed
Threats to vehicles regarding their External connectivity and connections 16 Manipulation of the connectivity of vehicle functions enables a cyber-attack, this can include telematics; systems that permit remote operations; and systems using short range wireless communications 16.1 Manipulation of functions designed to remotely operate systems, such as remote key, immobilizer, and charging pile
16.2 Manipulation of vehicle telematics (e.g. manipulate temperature measurement of sensitive goods, remotely unlock cargo doors)
16.3 Interference with short range wireless systems or sensors
17 Hosted 3rd party software, e.g. entertainment applications, used as a means to attack vehicle systems 17.1 Corrupted applications, or those with poor software security, used as a method to attack vehicle systems
18 Devices connected to external interfaces e.g. USB ports, OBD port, used as a means to attack vehicle systems 18.1 External interfaces such as USB or other ports used as a point of attack, for example through code injection
18.2 Media infected with a virus connected to a vehicle system
18.3 Diagnostic access (e.g. dongles in OBD port) used to facilitate an attack, e.g. manipulate vehicle parameters (directly or indirectly)
Threats to vehicle data/code 19 Extraction of vehicle data/code 19.1 Extraction of copyright or proprietary software from vehicle systems (product piracy)
19.2 Unauthorized access to the owner's privacy information such as personal identity, payment account information, address book information, location information, vehicle's electronic ID, etc.
19.3 Extraction of cryptographic keys
20 Manipulation of vehicle data/code 20.1 Illegal/unauthorized changes to vehicle's electronic ID
20.2 Identity fraud. For example, if a user wants to display another identity when communicating with toll systems, manufacturer backend
20.3 Action to circumvent monitoring systems (e.g. hacking/tampering/blocking of messages such as ODR Tracker data, or number of runs)
20.4 Data manipulation to falsify vehicle's driving data (e.g. mileage, driving speed, driving directions, etc.)
20.5 Unauthorized changes to system diagnostic data
21 Erasure of data/code 21.1 Unauthorized deletion/manipulation of system event logs
22 Introduction of malware 22.2 Introduce malicious software or malicious software activity
23 Introduction of new software or overwrite existing software 23.1 Fabrication of software of the vehicle control system or information system
24 Disruption of systems or operations 24.1 Denial of service, for example this may be triggered on the internal network by flooding a CAN bus, or by provoking faults on an ECU via a high rate of messaging
25 Manipulation of vehicle parameters 25.1 Unauthorized access or falsify the configuration parameters of vehicle's key functions, such as brake data, airbag deployed threshold, etc.
25.2 Unauthorized access or falsify the charging parameters, such as charging voltage, charging power, battery temperature, etc.
Potential vulnerabilities that could be exploited if not sufficiently protected or hardened 26 Cryptographic technologies can be compromised or are insufficiently applied 26.1 Combination of short encryption keys and long period of validity enables attacker to break encryption
26.2 Insufficient use of cryptographic algorithms to protect sensitive systems
26.3 Using already or soon to be deprecated cryptographic algorithms
27 Parts or supplies could be compromised to permit vehicles to be attacked 27.1 Hardware or software, engineered to enable an attack or fails to meet design criteria to stop an attack
28 Software or hardware development permits vulnerabilities 28.1 Software bugs. The presence of software bugs can be a basis for potential exploitable vulnerabilities. This is particularly true if software has not been tested to verify that known bad code/bugs is not present and reduce the risk of unknown bad code/bugs being present
28.2 Using remainders from development (e.g. debug ports, JTAG ports, microprocessors, development certificates, developer passwords, …) can permit access to ECUs or permit attackers to gain higher privileges
29 Network design introduces vulnerabilities 29.1 Superfluous internet ports left open, providing access to network systems
29.2 Circumvent network separation to gain control. Specific example is the use of unprotected gateways, or access points (such as truck-trailer gateways), to circumvent protections and gain access to other network segments to perform malicious acts, such as sending arbitrary CAN bus messages
32 Physical manipulation of systems can enable an attack 32.1 Manipulation of electronic hardware, e.g. unauthorized electronic hardware added to a vehicle to enable "man-in-the-middle" attack
Replacement of authorized electronic hardware (e.g., sensors) with unauthorized electronic hardware
Manipulation of the information collected by a sensor (for example, using a magnet to tamper with the Hall effect sensor connected to the gearbox)

Mitigation reference Mitigation description Mitigating Threats
M1 Security Controls are applied to back-end systems to minimise the risk of insider attack Threats to "Back-end servers"
M2 Security Controls are applied to back-end systems to minimise unauthorised access. Example Security Controls can be found in OWASP Threats to "Back-end servers"
M3 Security Controls are applied to back-end systems. Where back-end servers are critical to the provision of services there are recovery measures in case of system outage. Example Security Controls can be found in OWASP Threats to "Back-end servers"
Threats to "Update process"
M4 Security Controls are applied to minimise risks associated with cloud computing. Example Security Controls can be found in OWASP and NCSC cloud computing guidance Threats to "Back-end servers"
M5 Security Controls are applied to back-end systems to prevent data breaches. Example Security Controls can be found in OWASP Threats to "Back-end servers"
M6 Systems shall implement security by design to minimize risks Threats to "Vehicle communication channels"
M7 Access control techniques and designs shall be applied to protect system data/code. Example Security Controls can be found in OWASP.
Data manipulation attacks on sensors or transmitted data could be mitigated by correlating the data from different sources of information
Threats to "Vehicle communication channels"
Threats to "Potential targets of, or motivations for, an attack"
M8 Through system design and access control it should not be possible for unauthorized personnel to access personal or system critical data. Example of Security Controls can be found in OWASP Threats to "Back-end servers"
Threats to "Vehicle communication channels"
Threats to "Potential targets of, or motivations for, an attack"
M9 Measures to prevent and detect unauthorized access shall be employed Threats to "Vehicle communication channels"
Threats to "Physical manipulation of systems to enable an attack"
M10 The vehicle shall verify the authenticity and integrity of messages it receives Threats to "Vehicle communication channels"
M11 Security controls shall be implemented for storing cryptographic keys (e.g., use of Hardware Security Modules) Threats to "Vehicle communication channels"
Threats to "Update process"
Threats to "Potential targets of, or motivations for, an attack"
M12 Confidential data transmitted to or from the vehicle shall be protected Threats to "Vehicle communication channels"
M13 Measures to detect and recover from a denial of service attack shall be employed Threats to "Vehicle communication channels"
Threats to "Potential targets of, or motivations for, an attack"
M14 Measures to protect systems against embedded viruses/malware should be considered Threats to "Vehicle communication channels"
M15 Measures to detect malicious internal messages or activity should be considered Threats to "Vehicle communication channels"
M16 Secure software update procedures shall be employed Threats to "Update process"
M18 Measures shall be implemented for defining and controlling user roles and access privileges, based on the principle of least access privilege Threats to "Unintended human actions"
M19 Organizations shall ensure security procedures are defined and followed including logging of actions and access related to the management of the security functions Threats to "Unintended human actions"
M20 Security controls shall be applied to systems that have remote access Threats to "External connectivity and connections"
M21 Software shall be security assessed, authenticated and integrity protected
Security controls shall be applied to minimise the risk from third party software that is intended or foreseeable to be hosted on the vehicle
Threats to "External connectivity and connections"
M22 Security controls shall be applied to external interfaces Threats to "External connectivity and connections"
M23 Cybersecurity best practices for software and hardware development shall be followed
Cybersecurity testing with adequate coverage shall be followed
Cybersecurity best practices for system design and system integration shall be followed.
Threats to "Potential vulnerabilities that could be exploited if not sufficiently protected or hardened"
M24 Best practices for the protection of data integrity and confidentiality shall be followed for storing personal data. Example Security Controls can be found in ISO/SC27/WG5 Threats of "Data loss / data breach from vehicle"
Threats of "Physical loss of data"

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
4.1 Spoofing of messages (e.g. 802.11p V2X during platooning, GNSS messages, etc.) by impersonation M10 The vehicle shall verify the authenticity and integrity of messages it receives
4.2 Sybil attack (in order to spoof other vehicles as if there are many vehicles on the road) M11 Security controls shall be implemented for storing cryptographic keys (e.g., use of Hardware Security Modules)
5.1 Communication channels permit code injection into vehicle held data/code, for example tampered software binary might be injected into the communication stream M10 The vehicle shall verify the authenticity and integrity of messages it receives
M6 Systems shall implement security by design to minimize risks
5.2 Communication channels permit manipulation of vehicle held data/code M7 Access control techniques and designs shall be applied to protect system data/code
5.3 Communication channels permit overwrite of vehicle held data/code
5.4 Communication channels permit erasure of vehicle held data/code
21.1 Unauthorized deletion/manipulation of system event logs
5.5 Communication channels permit introduction of data/code to vehicle systems (write data code)
6.1 Accepting information from an unreliable or untrusted source M10 The vehicle shall verify the authenticity and integrity of messages it receives
6.2 Man in the middle attack / session hijacking M10 The vehicle shall verify the authenticity and integrity of messages it receives
6.3 Replay attack, for example an attack against a communication gateway allows the attacker to downgrade software of an ECU or firmware of the gateway
7.1 Interception of information / interfering radiations / monitoring communications M12 Confidential data transmitted to or from the vehicle shall be protected
7.2 Gaining unauthorized access to files or data M8 Through system design and access control it should not be possible for unauthorized personnel to access personal or system critical data. Example of Security Controls can be found in OWASP
8.1 Sending a large number of garbage data to vehicle information system, so that it is unable to provide services in the normal manner M13 Measures to detect and recover from a denial of service attack shall be employed
8.2 Black hole attack, disruption of communication between vehicles by blocking the transfer of messages to other vehicles M13 Measures to detect and recover from a denial of service attack shall be employed
9.1 An unprivileged user is able to gain privileged access, for example root access M9 Measures to prevent and detect unauthorized access shall be employed
10.1 Virus embedded in communication media infects vehicle systems M14 Measures to protect systems against embedded viruses/malware should be considered
11.1 Malicious internal (e.g. CAN) messages M15 Measures to detect malicious internal messages or activity should be considered
11.2 Malicious V2X messages, e.g. infrastructure to vehicle or vehicle-vehicle messages (e.g. CAM, DENM) M10 The vehicle shall verify the authenticity and integrity of messages it receives
11.3 Malicious diagnostic messages
11.4 Malicious proprietary messages (e.g. those normally sent from OEM or component/system/function supplier)

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
12.1 Compromise of over the air software update procedures. This includes fabricating the system update program or firmware M16 Secure software update procedures shall be employed
12.2 Compromise of local/physical software update procedures. This includes fabricating the system update program or firmware
12.3 The software is manipulated before the update process (and is therefore corrupted), although the update process is intact
12.4 Compromise of cryptographic keys of the software provider to allow invalid update M11 Security controls shall be implemented for storing cryptographic keys
13.1 Denial of Service attack against update server or network to prevent rollout of critical software updates and/or unlock of customer specific features M3 Security Controls shall be applied to back-end systems. Where back-end servers are critical to the provision of services there are recovery measures in case of system outage. Example Security Controls can be found in OWASP

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
15.1 Innocent victim (e.g. owner, operator or maintenance engineer) is tricked into taking an action to unintentionally load malware or enable an attack M18 Measures shall be implemented for defining and controlling user roles and access privileges, based on the principle of least access privilege
15.2 Defined security procedures are not followed M19 Organizations shall ensure security procedures are defined and followed including logging of actions and access related to the management of the security functions

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
16.1 Manipulation of functions designed to remotely operate vehicle systems, such as remote key, immobiliser, and charging pile M20 Security controls shall be applied to systems that have remote access
16.2 Manipulation of vehicle telematics (e.g. manipulate temperature measurement of sensitive goods, remotely unlock cargo doors)
16.3 Interference with short range wireless systems or sensors
17.1 Corrupted applications, or those with poor software security, used as a method to attack vehicle systems M21 Software shall be security assessed, authenticated and integrity protected. Security controls shall be applied to minimise the risk from third party software that is intended or foreseeable to be hosted on the vehicle
18.1 External interfaces such as USB or other ports used as a point of attack, for example through code injection M22 Security controls shall be applied to external interfaces
18.2 Media infected with viruses connected to the vehicle
18.3 Diagnostic access (e.g. dongles in OBD port) used to facilitate an attack, e.g. manipulate vehicle parameters (directly or indirectly) M22 Security controls shall be applied to external interfaces

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
19.1 Extraction of copyright or proprietary software from vehicle systems (product piracy / stolen software) M7 Access control techniques and designs shall be applied to protect system data/code. Example Security Controls can be found in OWASP
19.2 Unauthorized access to the owner's privacy information such as personal identity, payment account information, address book information, location information, vehicle's electronic ID, etc. M8 Through system design and access control it should not be possible for unauthorized personnel to access personal or system critical data. Examples of Security Controls can be found in OWASP
19.3 Extraction of cryptographic keys M11 Security controls shall be implemented for storing cryptographic keys e.g. Security Modules
20.1 Illegal/unauthorised changes to vehicle's electronic ID M7 Access control techniques and designs shall be applied to protect system data/code. Example Security Controls can be found in OWASP
20.2 Identity fraud. For example, if a user wants to display another identity when communicating with toll systems, manufacturer backend
20.3 Action to circumvent monitoring systems (e.g. hacking/ tampering/ blocking of messages such as ODR Tracker data, or number of runs) M7 Access control techniques and designs shall be applied to protect system data/code. Example Security Controls can be found in OWASP.
Data manipulation attacks on sensors or transmitted data could be mitigated by correlating the data from different sources of information
20.4 Data manipulation to falsify vehicle's driving data (e.g. mileage, driving speed, driving directions, etc.)
20.5 Unauthorised changes to system diagnostic data
21.1 Unauthorized deletion/manipulation of system event logs M7 Access control techniques and designs shall be applied to protect system data/code. Example Security Controls can be found in OWASP.
22.2 Introduce malicious software or malicious software activity M7 Access control techniques and designs shall be applied to protect system data/code. Example Security Controls can be found in OWASP.
23.1 Fabrication of software of the vehicle control system or information system
24.1 Denial of service, for example this may be triggered on the internal network by flooding a CAN bus, or by provoking faults on an ECU via a high rate of messaging M13 Measures to detect and recover from a denial of service attack shall be employed
25.1 Unauthorized access to falsify configuration parameters of vehicle's key functions, such as brake data, airbag deployed threshold, etc. M7 Access control techniques and designs shall be applied to protect system data/code. Example Security Controls can be found in OWASP
25.2 Unauthorized access to falsify charging parameters, such as charging voltage, charging power, battery temperature, etc.

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
26.1 Combination of short encryption keys and long period of validity enables attacker to break encryption M23 Cybersecurity best practices for software and hardware development shall be followed.
Cybersecurity testing with adequate coverage shall be followed.
Cybersecurity best practices for system design and system integration shall be followed.
26.2 Insufficient use of cryptographic algorithms to protect sensitive systems
26.3 Using deprecated cryptographic algorithms
27.1 Hardware or software, engineered to enable an attack or fail to meet design criteria to stop an attack M23 Cybersecurity best practices for software and hardware development shall be followed.
28.1 The presence of software bugs can be a basis for potential exploitable vulnerabilities. This is particularly true if software has not been tested to verify that known bad code/bugs is not present and reduce the risk of unknown bad code/bugs being present M23 Cybersecurity best practices for software and hardware development shall be followed.
Cybersecurity testing with adequate coverage shall be followed.
28.2 Using remainders from development (e.g. debug ports, JTAG ports, microprocessors, development certificates, developer passwords, …) can permit an attacker to access ECUs or gain higher privileges
29.1 Superfluous internet ports left open, providing access to network systems
29.2 Circumvent network separation to gain control. Specific example is the use of unprotected gateways, or access points (such as truck-trailer gateways), to circumvent protections and gain access to other network segments to perform malicious acts, such as sending arbitrary CAN bus messages M23 Cybersecurity best practices for software and hardware development shall be followed.
Cybersecurity best practices for system design and system integration shall be followed.

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
31.1 Information breach. Personal data may be breached when the car changes user (e.g. is sold or is used as hire vehicle with new hirers) M24 Best practices for the protection of data integrity and confidentiality shall be followed for storing personal data.

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
32.1 Manipulation of OEM hardware, e.g. unauthorised hardware added to a vehicle to enable "man-in-the-middle" attack M9 Measures to prevent and detect unauthorized access shall be employed

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
1.1 / 3.1 Abuse of privileges by staff (insider attack) M1 Security Controls are applied to back-end systems to minimise the risk of insider attack
1.2 / 3.3 Unauthorised internet access to the server (enabled for example by backdoors, unpatched system software vulnerabilities, SQL attacks or other means) M2 Security Controls are applied to back-end systems to minimise unauthorised access. Example Security Controls can be found in OWASP
1.3 / 3.4 Unauthorised physical access to the server (conducted by for example USB sticks or other media connecting to the server) M8 Through system design and access control it should not be possible for unauthorised personnel to access personal or system critical data
2.1 Attack on back-end server stops it functioning, for example it prevents it from interacting with vehicles and providing services they rely on M3 Security Controls are applied to back-end systems. Where back-end servers are critical to the provision of services there are recovery measures in case of system outage. Example Security Controls can be found in OWASP
3.2 Loss of information in the cloud. Sensitive data may be lost due to attacks or accidents when data is stored by third-party cloud service providers M4 Security Controls are applied to minimise risks associated with cloud computing. Example Security Controls can be found in OWASP and NCSC cloud computing guidance
3.5 Information breach by unintended sharing of data (e.g. admin errors, storing data in servers in garages) M5 Security Controls are applied to back-end systems to prevent data breaches. Example Security Controls can be found in OWASP

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
15.1 Innocent victim (e.g. owner, operator or maintenance engineer) is tricked into taking an action to unintentionally load malware or enable an attack M18 Measures shall be implemented for defining and controlling user roles and access privileges, based on the principle of least access privilege
15.2 Defined security procedures are not followed M19 Organizations shall ensure security procedures are defined and followed including logging of actions and access related to the management of the security functions

Table A1 reference Threats to "Vehicle communication channels" Mitigation reference Mitigation description
30.1 Damage caused by a third party. Sensitive data may be lost or compromised due to physical damages in cases of traffic accident or theft M24 Best practices for the protection of data integrity and confidentiality shall be followed for storing personal data. Example Security Controls can be found in ISO/SC27/WG5
30.2 Loss from DRM (digital right management) conflicts. User data may be deleted due to DRM issues
30.3 The (integrity of) sensitive data may be lost due to IT components wear and tear, causing potential cascading issues (in case of key alteration, for example)
An unhandled error has occurred. Reload 🗙