T4K3.news
Car dealer portal flaw exposes data and enables remote car unlocks
Security researchers found weaknesses in a carmaker's centralized dealer portal that could let attackers access customer data and unlock vehicles remotely; the vendor fixed the issue after disclosure.

A security researcher found weaknesses in a dealer portal that could give attackers access to customer data and the ability to unlock vehicles remotely.
Security flaws in a carmaker portal expose data and enable remote car unlocks
A security researcher, Eaton Zveare of Harness, discovered flaws in a carmaker’s centralized dealer portal. The bugs could let an attacker create a new admin account with unfettered access, letting them view personal and financial data, tracking vehicles, and enrolling owners in features that allow remote control of some car functions. The vulnerability arose from a login process that could be bypassed by loading and altering code in the user’s browser.
Zveare demonstrated that the admin account could access more than 1,000 dealer accounts across the United States and described tools within the portal that could be used to look up vehicle data and owner information with minimal identifiers. The portal’s single sign-on links multiple dealer systems, raising the risk that an attacker could move between systems and impersonate other users. While the researcher did not test theft in the real world, he warned that the flaws could be exploited to break into vehicles or disrupt shipments. The carmaker fixed the issues within about a week after disclosure, and there were no reports that the flaws had been exploited in the wild.
Key Takeaways
"They’re just security nightmares waiting to happen"
Zveare on the risk from impersonation and broad access
"Only two simple API vulnerabilities blasted the doors open"
Key finding that opened access across portals
"Could basically do that to anyone just by knowing their name"
Implication of privacy risk from a public data lookups tool
"If you’re going to get those wrong, then everything just falls down"
Zveare on the fragility of authentication
The incident highlights how a single authentication weakness can cascade into broad access across a dealer network. When a system strains to connect multiple portals under one login, it creates a single point of failure that can be abused to surface sensitive data and interfere with vehicle functions. The lesson is not just about one portal; it is about governance. Carmakers often rely on third party vendors and complex integrations, which increases the attack surface. Stronger authentication, least privilege access, and regular security testing should be mandatory, not optional. The episode also tests trust: customers expect privacy and safety, not a potential doorway for misuse.
Highlights
- Two simple API vulnerabilities blasted the doors open
- They’re just security nightmares waiting to happen
- Could basically do that to anyone just by knowing their name
- If you’re going to get those wrong, then everything just falls down
Security vulnerability in dealer portal raises privacy and safety concerns
A flaw allowed creation of an admin account with broad access, exposing customer data, vehicle records, and telematics, with potential for remote vehicle control. The issue was fixed within about a week, but the underlying architectural risks remain.
Security should be baked into every connected car path, not treated as an afterthought.
Enjoyed this? Let your friends know!
Related News

Microsoft Issues Urgent Patch for SharePoint Vulnerability

Cursor AI Code Editor Patch Released

Apple releases urgent iOS 18.6 update

Serious SharePoint Vulnerability Under Active Exploit

Gemini CLI vulnerability allows silent code execution

Lovense reveals security flaws exposing user emails

Emergency Patch Released for SharePoint Attack

TSA advises against using public WiFi for smartphone users
