Hacker Gain Root Access to John Deere Tractors

Share post:

At the DefCon security conference in Las Vegas on Saturday, a hacker named Sick Codes jailbreak John Deere & Co tractors. This enabled him take control of multiple models through their touchscreens.

Sick Codes findings therefore highlights the security implications of right-to-repair. The right to repair is a proposed government legislation that would allow consumers to repair and modify their own consumer product. The legislation therefore eliminates the requirement that consumers only need to use the services they provide by restricting access to tools and components.

To develop his jailbreak, Sick Codes used numerous generations of John Deere tractor control touchscreen consoles. Models used for this exploit are “2630” and “4240.”

Sick Codes has been experimenting for many months with a number of touchscreen circuit boards to find bypasses for John Deere dealers’ authentication requirements.

The hacker was able to perform a reboot check to restore the device as if it were being retrieved from a certified vendor. He explained that once in such an environment, the system would provide protocols worth more than 1.5 GB to help authorized service providers diagnose problems.

The logs also revealed the path to another potential timing attack that could grant deeper access. Soldering controls directly to the PCB eventually allowed the hacker to bypass the system’s protective mechanisms.

While the approach requires physical access to the PCB, Sick Codes explains that a tool based on the vulnerabilities could be more easily used to execute the jailbreak.

The sources for this piece include an article in Archive.today.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways