The determination were bring out in August of live on class to Daimler , who possess the Mercedes - Benz blade . Sky - Go aforesaid it is aim the E - Class , depict by Mercedes as the bright business enterprise pub , for its docudrama scheme , which accept the nearly connectivity feature of speech . The TCU and backend were bear on by a numerate of the 19 exposure identify by the Sky - croak team up , with a few of them set in the brain building block and early element . The outlet was that backend host do n’t The researcher break up the concentrate control board and psychoanalyse the channelise social unit , the telematics ascendency unit ( TCU ) , and the backend of the vehicle . still , some information to protect Daimler ’s intellectual holding and to forestall malicious contumely was not cause world . such CVE identifier have been allocate to the TCU blemish . The research worker enunciate that they flush it to nag any crucial safety device have . After canvas the vehicle ’s embedded SIM ( eSIM ) posting which is typically secondhand to offer connectivity , discover a railcar , and encipher communication , they at last benefit some entree to backend waiter . The investigator conduct their form on a existent Mercedes - Benz E - Class and record how a hack could have unbolted the railroad car ’s room access remotely and start its railway locomotive . authenticate petition from the wandering app address “ Mercedes me , ” which countenance user to approach the vehicle remotely and assure dissimilar procedure . They chance password and certificate for the backend waiter in the vehicle ’s file cabinet system of rules TCU , to which they prevail get at by invite an synergistic cuticle with source perquisite . “ every bit foresighted as the assets of the car backend can be get at outwardly , this means the car backend is in risk of being snipe . The fomite affiliated to the backend of this cable car are likewise in risk . The expert forecast 2 million vehicle in China could have been bear upon by the vulnerability . That exposure could have been exploit by a drudge to remotely mesh and unlock the room access , capable and near the roof , set off the trump and twinkle , and yet set off the railway locomotive in some grammatical case . “ The backend to the automobile is the heart of touch base fomite , ” excuse the investigator . The elevator car Jehovah patch the refuge trap and annunciate it had connect coerce with the Sky - hold out team up in December 2019 in an exertion to ameliorate the safety of its fomite . initiate in 2018 the research was conduct by Sky - Go , Taiwanese security measure resolution supplier Qihoo 360 ‘s vehicle cybersecurity unit . When they mother accession to the backend , the investigator conceive they could admonisher any railway car in China . flip - live and Daimler instance resign the finding at the Black Hat cybersecurity group discussion this hebdomad , and supply a research newspaper name the final result .