Logo for GIGAOM 365x70

See what API testing solution came out on top in the GigaOm Radar Report. Get your free analyst report >>

Why Automotive Cybersecurity Is Important

Headshot of Ricardo Camacho, Director of Safety & Security Compliance
January 30, 2025
8 min read

Automotive companies now depend on complex software to build smart cars. This has raised some vulnerability concerns in modern automobiles. Read on to learn why automotive companies should integrate cybersecurity into their car development strategies.

The move by many automotive companies to electronic road vehicles has fundamentally changed the industry, increasing the connectivity and smarts in cars. As they become more connected and smarter, electronic vehicles (EVs) also become more reliant on software for vehicle operations, driving more features and functionality to enhance the driving experience.

More features and functionality in road vehicles result in more complexity and more code. More code means more problems.

Problems like an increased vehicle attack surface could lead to vulnerabilities that enable attackers to steal or take control of road vehicles. These problems pose serious safety risks and significant cybersecurity challenges. Such concerns will continue to drive the transformation of modern car design and development.

Since software powers modern road vehicles, cybersecurity is now as important as safety has been in the past. A typical electric vehicle (EV) operates over 100 million lines of code, depending on its equipped features. Protecting road vehicles from cybersecurity threats is more critical than ever before

One of the major attack vectors targeted is the electronic control unit (ECU). It provides vital communication and essential capabilities for operating, monitoring, and configuring the vehicle subsystems.

What Is an Electronic Control Unit (ECU)?

ECUs are microprocessor-controlled devices that provide a wide range of vehicle essential functions including the following:

  • Infotainment and connectivity
  • Advanced driver assistance systems (ADAS)
  • Battery and energy management
  • Diagnostics and maintenance
  • Emission and environmental control
  • Vehicle-to-everything (V2X) communication
  • Advanced security
  • Electric and autonomous driving support
  • Lighting and visibility

The ECUs are grouped into subsystems based on their functionality due to the time-sensitive nature of critical events. Modern road vehicles have up to 100 ECUs running vehicle functions. ECUs primarily communicate via BUS protocols like CAN, LIN, FlexRay, and Ethernet. They also rely on serial, wireless, and optical methods, depending on the application. A gateway manages and validates messages sent by ECUs.

The intention of deploying ECUs behind a gateway is to ensure that only devices that need to communicate with each other are doing so. This is an improvement from traditional ECU designs that accepted commands from and shared information with any entity on the same wiring bus. This was the attack vector for many of the automotive attacks like the famous Jeep hack, which triggered many improvements around automotive cybersecurity standards.

While the gateway remains central for communication and validation, newer trends like domain-based and centralized architectures, Ethernet backbones, and advanced cybersecurity measures are transforming how ECUs communicate. In such architectures, the role of the gateway is evolving to handle high-bandwidth communication, including Ethernet-based traffic, in addition to traditional buses like CAN and LIN. However, as automotive technology advances, the transition toward software-defined vehicles (SDVs) is reshaping the way ECUs operate within modern vehicles.

ECU Centric Threats and Mitigations

The proliferation of interconnected ECUs, managing critical functions from engine performance to infotainment, has transformed vehicles into embedded systems networks.

While enabling advanced features, this architecture introduces vulnerabilities in the hardware, firmware, and communication layers. Recent incidents highlight how attackers increasingly target ECUs and their communication protocols, like CAN bus, to compromise vehicle integrity.

Kia Web Portal Vulnerability (2024): Gateway to ECU Manipulation

A 2024 breach of Kia’s customer portal exposed not only user data but also indirect access to telematics ECUs in connected vehicles. Attackers exploited weak API authentication to send unauthorized commands to vehicles’ head units, potentially altering ECU configurations (for example disabling alarms or geofencing). This incident underscored the risks of insufficiently secured backend systems interfacing with in-vehicle ECUs, prompting Kia to isolate critical ECU communication channels from customer-facing APIs.

Subaru Starlink System Flaws (2025): Compromising OTA ECU Updates

Subaru’s Starlink telematics system, which manages OTA updates for safety-critical ECUs (for example, braking and transmission control modules), was found in 2025 to use weak encryption during firmware delivery. Researchers demonstrated that malicious actors could intercept and modify ECU update packages, injecting code to disable collision-avoidance systems. Subaru’s response—adopting cryptographically signed ECU firmware and hardware security modules (HSMs)—illustrates the growing need for end-to-end protection of ECU software pipelines.

Headlight Hacking Theft Technique (2024): CAN Bus Exploitation via Peripheral ECUs

In late 2024, thieves exploited vulnerabilities in adaptive headlight control ECUs, which were improperly isolated from the vehicle’s CAN bus. By physically accessing the headlight wiring, attackers sent spoofed CAN messages to the powertrain ECU, bypassing immobilizers and enabling keyless theft. This attack emphasized the importance of segmenting noncritical ECUs (such as lighting systems) from safety-critical networks and implementing CAN bus intrusion detection systems (IDS).

Pwn2Own Automotive 2025: ECU Takeovers in Action

The 2025 Pwn2Own Automotive competition showcased escalating ECU-focused exploits. Participants targeted:

  • EV charging ECUs. A zero-day flaw allowed manipulation of charging parameters, risking battery thermal runaway.
  • Autonomous parking ECUs. Researchers exploited sensor fusion vulnerabilities to disable obstacle detection.
  • Gateway ECUs. A team achieved full vehicle control by compromising the central gateway ECU, which routes communications between critical systems.

These demonstrations accelerated industry adoption of ECU-specific protections, such as runtime integrity checks and secure debug interfaces.

Securing the ECU Ecosystem

Modern vehicles rely on 100+ ECUs, creating a sprawling attack surface. Recent breaches highlight three priorities:

  1. ECU firmware hardening. Enforce code signing, minimize attack surfaces, for example, disabling unused services in infotainment ECUs.
  2. Network segmentation. Isolate safety-critical ECUs like engine control from less secure subsystems like telematics.
  3. Supply chain vigilance. Vet third-party ECU software as vulnerabilities in supplier code, such as headlight modules, can spill over into other components.

Regulatory frameworks like UN R155 now mandate ECU-specific risk assessments, while standards like ISO 21434 require ECU lifecycle security controls. As vehicles evolve, safeguarding ECUs, and the networks connecting them, will remain pivotal to mitigating cyber-physical risks.

Secure by Design

Building security-in from the onset is the number one goal of the new automotive cybersecurity standard, ISO 21434. There’s a running tally of vulnerabilities in ECUs that demonstrate the seriousness of cybersecurity and its impact on safety, which this standard attempts to address with requirements and recommendations that directly impact how components for road vehicles are designed and developed.

ISO 21434 seeks to integrate high-quality safety and cybersecurity measures throughout the entire product engineering lifecycle to ensure road vehicles have been designed, manufactured, and deployed with security mechanisms to protect the confidence, integrity, availability, and authenticity of vehicle functions in road vehicles.

Two core aspects of ISO 21434 focus on the following.

  1. Conducting Threat Analysis and Risk Assessment (TARA) activities that focus on the likely threat scenarios and attack vectors, and how these conditions can impact the safety and cybersecurity of road vehicles. Using TARA and understanding likely attack vectors against components is the ideal way to codify cybersecurity into design and architecture to mitigate cyberattacks. Product teams should leverage the TARA to guide and inform security testing.
  2. Ensuring product development addresses cybersecurity in all phases of the product engineering life cycle from concept (design) to decommissioning. ISO 21434 encourages alignment with the system engineering V-model to guide vehicle manufacturers and suppliers in following sound architectural design requirements for cybersecurity. This calls for software verification and validation as part of product testing.

Infographic of a V-model for automotive software to satisfy ISO/SAE 21434.

ISO 21434 Calls for Software Verification Activities

Software testing plays a critical role in helping manufacturers and suppliers address requirements and recommendations outlined in ISO 21434. Formalizing static code analysis as part of software verification activities is an ideal way to identify and eliminate ambiguity in code, as well as pinpoint weaknesses that could expose vulnerabilities in software used in ECU components. This helps minimize the attack surface that an attacker can exploit to compromise ECUs that control critical vehicle operations.

Specifically, ISO 21434 references and calls out static analysis in section 10.4 Requirements and Recommendations.

Section 10.4.1 Design

Excerpt from ISO 21434, section 10.4.1 Design

The requirement details section 10.4.1 for design highlights the need to select programming languages suitable for enforcing code that’s syntactically correct with valid structure and grammar. The code must logically make sense semantically and correspond to a set of rules for the language being used. Code must be able to compile cleanly to transform into a sequence of instructions.

Enforcing strong typing, the use of language subsets, and implementing defensive implementation techniques are all requirements specified in ISO 21434. Formalizing secure coding compliance practices using Parasoft MISRA C/C++ and CERT C/++ checkers and rules will help manufacturers and suppliers adhere to ISO 21434 requirements and recommendations for mitigating potential risks in software and design.

Employing cybersecurity and safety coding practices to support software verification and validation is a best practice and essential in confirming the cybersecurity specification outlined in ISO 21434. Using Parasoft C/C++ code analysis capabilities eases the rigor of software testing associated with critical-safety software.

Automating software testing with Parasoft C/C++test and C/C++test CT is made simple with an integrated approach that incorporates AI-enhanced static analysis, code coverage, unit testing, requirement traceability, and reporting analytics to streamline your ISO 21434 compliance requirements.

Section 10.4.2 Integration and Verification

Excerpt from ISO 21434, section 10.4.2 Integration and verification

ISO 21434 section 10.4.2 provides a list of methods for software verification that can be satisfied using Parasoft’s C/C++ code analysis capabilities. Many security bugs can be detected using control and data flow analysis. Parasoft’s C/C++ code analysis engine is primed to give product engineering teams the breadth and depth into complex flow analysis like use-after-frees, double frees, and buffer overflows.

RC-10-12

Other software verification and testing activities referenced in ISO 21434 include fuzzing, penetration testing, vulnerability scanning. They’re listed as recommendations, noted by RC-10-12. Given the complexity and size of modern software development, running additional testing techniques and tools should be required because each technique finds different types of issues.

Excerpt from ISO 21434, section section 10.4.2 Integration and verification, RC-10-12

To uncover security risks in software product engineering teams should use tools and testing techniques to cover the following scenarios.

  • Known Known. Tests to identify software with known/identifiable CVEs. This would include testing capabilities like software composition analysis (SCA) tools that flag known CVEs in software components.
  • Known Unknown. Tests to identify CWEs that could be exploitable and expose vulnerabilities (CVEs) in software. This would include testing capabilities like static and dynamic analysis.
  • Unknown Unknown. Tests to identify software with unidentified risks/issues, there is no known CWE or CVE associated with it. This would include testing capabilities like fuzzing.

Cybersecurity: The Front Seat Driver

Putting cybersecurity in the front seat of road vehicles with ISO 21434 will help the automotive industry drive better practices to reduce and mitigate cyber threats and attacks that could eventually lead to fatalities.

The connectivity and intelligence in cars has changed the way cybersecurity is contextualized and prioritized in product engineering. By formalizing ISO 21434, product engineering teams can leverage threat analysis and threat modeling activities to inform design decisions and product development throughout the entire lifecycle.

Building security-in cannot just be a catchy phrase anymore because drivers’ safety and security is at stake. Cybersecurity must be ingrained into the entire product engineering team mindset and activities so that the entire team is thinking about ways in which software should be designed and developed to prevent and mitigate cyberattacks.

ISO 21434 provides a road map to help manufacturers and suppliers navigate through safety and cybersecurity challenges in product development. This new standard serves as a building block to bolster security protection mechanisms in road vehicles that will ultimately save lives.

Parasoft: The Road to Automotive Cybersecurity

Parasoft’s C/C++ integrated automated testing solutions are the best of breed and scale across your SDLC and product engineering efforts. Uniquely positioned with deep experience and expertise in the embedded software market, Parasoft helps you meet your safety and cybersecurity compliance needs.

Graphic showing a variation of the V-model, testing methods, and Parasoft solutions.

A unique combination of software test automation tools, analytics, AI, and reporting provides visibility into quality and security issues from the start. This enables product engineer teams to accelerate software verification in accordance with standards and best practices required by the marketplace.

Guide to CI/CD for Automotive DevOps

“MISRA”, “MISRA C” and the triangle logo are registered trademarks of The MISRA Consortium Limited. ©The MISRA Consortium Limited, 2021. All rights reserved.