An attacker can plug in a USB flash drive that acts like a LAN cable to gain Ethernet access to the system.
An attacker plugs his own hardware into the system or network as a "theft device".
OBD dongle connects to a vehicle's OBD interface. This interface is present in all modern automotive vehicles and is used for vehicle diagnosis and monitoring. Dongles can communicate via Wifi, Bluetooth, LTE, 5G and can be accessed from the Internet. An attacker could transfer malicious software to the OBD dongle to later gain access to the vehicle or compromise the control units.
Attackers leveraging compromised systems within vehicle repair shops, garages, or factories. By exploiting these vulnerabilities, attackers can gain unauthorized access to the vehicle's systems, allowing them to introduce and execute malicious software.
Attackers target vulnerabilities within the vehicle's DSRC system, used for V2V and V2I communications. Attackers can interfere with critical safety functions and traffic coordination.
By physically accessing compartments designed for maintenance or service tasks, attackers can connect to internal networks or systems of the vehicle. This technique is especially concerning for rail vehicles where service compartments might grant access to critical control systems.
Attackers target vulnerabilities within the vehicle's C-V2X communication system, which facilitates information exchange between vehicles and infrastructure. This could potentially also compromise safety and traffic management systems.
Vulnerabilities in bluetooth stack may allow an attacker to execute code and gain access to the system.
Attackers exploiting vulnerabilities or weak configurations in a vehicle's onboard WiFi system.