Attackers can exploit vulnerabilities in remote services to move from asset to asset within the vehicle.