Hyundai’s AES key was lifted from an example


The Register’s Thomas Claburn reported on a blog post by greenluigi1 where they investigate the feasibility of modifying the car’s In-Vehicle Infotainment system. It’s well written with clear steps and screenshots; I love reading through someone’s thought process when it comes to this stuff.

Here’s where things get dicey:

While looking through the source code available from Mobis’s site, I searched for all files that were shell scripts. In the results I found a shell script file called This file opened up everything. Turns out this was the script that creates the system update zip file.

Turns out I had the zip password for the system update on my hard drive the entire time. And helpfully the encryption method, key, and IV was also in the script. The script also hinted at RSA signing being used, but unfortunately the key used for that was not in the source code. But at least I had the encryption key. To verify that no one else had gotten this far I googled the encryption key.

And here’s the kicker that everyone is talking about:

Turns out the encryption key in that script is the first AES 128bit CBC example key listed in the NIST document SP800-38A.

What worries me is how much such code is out there. People joke that StackOverflow is basically a copy+pasta site at this stage, and if a contractor for a car company doesn’t have internal processes to catch this stuff, it could happen almost anywhere. Even procedurally-generated code makes these mistakes.

Author bio and support


Ruben Schade is a technical writer and infrastructure architect in Sydney, Australia who refers to himself in the third person in bios. Hi!

The site is powered by Hugo, FreeBSD, and OpenZFS on OrionVM, everyone’s favourite bespoke cloud infrastructure provider.

If you found this post helpful or entertaining, you can shout me a coffee or send a comment. Thanks ☺️.