Attacker can inject messages to the internal bus system of the vehicle to override display outputs or vehicle operation values like the vehicle speed.
A DoS attack on an automotive vehicle's CAN network can overload the system, preventing the delivery of CAN messages. In such scenarios, different ECUs respond variably. For instance, in a Ford vehicle, the overload causes the PSCM ECU to shut down, disabling steering assistance. Consequently, the steering wheel becomes rigid, limiting turns to approximately 45%, thereby preventing sharp maneuvers.
An attacker can manipulate the displays for speed, fuel level and other important parameters on the IPC.
Adversaries can display arbitrary information on the PIS screens.
Adversaries can exploit a security vulnerability in the Polish train system by sending simple "radio-stop" commands via radio frequency, triggering the trains emergency stop function. The radio system lacks encryption or authentication, allowing anyone with radio equipment to execute the command.
Attackers can manipulate the speed of some rail vehicles via radio signals.
An attacker can unexpectedly deploy them by tampering with the airbag or prevent their deployment in the event of an accident.