Jump to content

John Deere security flaws exposed sensitive customer information: Difference between revisions

From Consumer_Action_Taskforce
Expand immediate aftermath of the incident
Emanuele (talk | contribs)
mNo edit summary
 
(8 intermediate revisions by 5 users not shown)
Line 1: Line 1:
A number of security flaws in the software [[John Deere]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment, according to a security researcher who found the vulnerabilities<ref name=":0">https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/</ref>. Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give "access to customer accounts, dealer accounts, or sensitive personal information"<ref name=":0" />. This was not true according to the security researcher, explaining that on newer farm equipment he was able to see the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number<ref name=":0" />.
A number of security flaws in the software [[John Deere|'''John Deere''']] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner up with security researchers.


Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions<ref>https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/</ref> for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact<ref name=":1">[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=hqablgjQ02g John Deere security flaw exposed address of every customer & more!]</ref>.
==Security flaws and the reporting process==
A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere's software.<ref name=":0">{{Cite web|url=https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/|publisher=Vice Media|title=Bugs Allowed Hackers to Dox John Deere Tractor Owners|author=Lorenzo Franceschi-Bicchierai|date=22 April 2021|language=en|format=article}}</ref> Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give "access to customer accounts, dealer accounts, or sensitive personal information."<ref name=":0" /> This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.<ref name=":0" />


In the immediate aftermath of the incident, John Deere posted a spate job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development.” and “develop threat models using industry best practices<ref>https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/</ref>. Also close after the incident, John Deere writes "This week's forecast: one to three inches of nonsense", which can be interpreted as denying that the recent security flaws were severe<ref name=":2">[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=rB_SleNKBus John Deere instigates hackers, gets hacked again]</ref>. John Deere addressed it by stating "We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers' sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article"<ref>https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world</ref>. But that is not true because the researcher claims they could access the data<ref name=":0" /><ref name=":1" /><ref name=":2" />.
Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions<ref>{{Cite web|url=https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-url=https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-date=24 Apr 2021|url-status=dead|title=Global Security Request form with terms on personal data and privacy|publisher=John Deere|language=en}}</ref> for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.<ref name=":1">{{Cite web |author=Louis Rossmann |date=22 Apr 2021 |title=John Deere security flaw exposed address of every customer & more! |url=https://www.youtube.com/watch?v=hqablgjQ02g |publisher=YouTube |language=en |format=video |ref=Rossmann-video-1}}</ref>


Quite a bit later in 2024, John Deere has also partnered up with HackerOne<ref>https://www.hackerone.com/</ref> to enhance collaborative relationships with security researchers<ref>https://www.deere.com/en/our-company/digital-security/hackerone-program/</ref>.
===John Deere's response===
In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.<ref>{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article}}</ref> Also, soon after the incident, John Deere wrote, "This week's forecast: one to three inches of nonsense", which can be interpreted as denying that the recent security flaws were severe.<ref name=":2">{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2}}</ref> John Deere addressed it by stating "We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers' sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article."<ref>{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming}}</ref> However, their claims seem to be not true, because the researcher claims they could access the data.<ref name=":0" /><ref name=":1" /><ref name=":2" />


== References ==
Quite a bit later in 2024, John Deere has also partnered up with HackerOne to enhance collaborative relationships with security researchers.<ref>{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program}}</ref>
 
==References==
<references />
<references />
[[Category:John Deere]]
[[Category:John Deere]]
[[Category:Incidents]]
[[Category:Incidents]]
[[Category:Louis Rossmann]]
[[Category:Articles based on videos]]
[[Category:Videos]]

Latest revision as of 20:15, 30 March 2025

A number of security flaws in the software John Deere provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner up with security researchers.

Security flaws and the reporting process[edit | edit source]

A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere's software.[1] Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give "access to customer accounts, dealer accounts, or sensitive personal information."[1] This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.[1]

Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions[2] for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.[3]

John Deere's response[edit | edit source]

In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.[4] Also, soon after the incident, John Deere wrote, "This week's forecast: one to three inches of nonsense", which can be interpreted as denying that the recent security flaws were severe.[5] John Deere addressed it by stating "We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers' sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article."[6] However, their claims seem to be not true, because the researcher claims they could access the data.[1][3][5]

Quite a bit later in 2024, John Deere has also partnered up with HackerOne to enhance collaborative relationships with security researchers.[7]

References[edit | edit source]

  1. Jump up to: 1.0 1.1 1.2 1.3 Lorenzo Franceschi-Bicchierai (22 April 2021). "Bugs Allowed Hackers to Dox John Deere Tractor Owners" (article). Vice Media.
  2. "Global Security Request form with terms on personal data and privacy". John Deere. Archived from the original on 24 Apr 2021.
  3. Jump up to: 3.0 3.1 Louis Rossmann (22 Apr 2021). "John Deere security flaw exposed address of every customer & more!" (video). YouTube.
  4. Paul F. Roberts (14 Apr 2021). "184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability" (article). Forbes.
  5. Jump up to: 5.0 5.1 Louis Rossmann (25 Apr 2021). "John Deere instigates hackers, gets hacked again" (video). YouTube.
  6. Laurie Bedord (23 Apr 2021). "John Deere Addresses the Ongoing Risks of Living in a Digital World" (article). Successful Farming.
  7. "Deere Bolsters Information Security With HackerOne Program" (press release). John Deere.