Keyless Entry Flaw in KIA Ecuador Vehicles Puts Thousands at Risk of Theft

Security researcher Danilo Erazo has uncovered two critical vulnerabilities (CVE-2025-6029 and CVE-2025-6030) in KIA Ecuador’s aftermarket keyless entry systems (KES), enabling attackers to clone key fobs and unlock vehicles via replay attacks.

Affected models include the Kia Soluto, Rio, and Picanto (2022–2025), which use insecure learning code technology despite global adoption of rolling codes since the 1990s.

Technical Breakdown of Learning Code Flaws

KIA Ecuador’s key fobs use HS2240 (2022–2023) and EV1527 (2024–2025) chips, which generate static 24-bit learning codes instead of dynamic rolling codes.

These codes occupy a finite 1-million-combination space, creating three primary risks:

  1. Replay Attacks: Capturing and retransmitting a single RF signal unlocks the car.
  2. Brute Force Exploits: Attackers can test all 1 million possible codes in under 10 minutes using tools like AutoRFKiller.
  3. Backdoor Injection: Receivers accept up to four codes, allowing attackers to program unauthorized “ghost” keys.

Erazo demonstrated these exploits using a HackRF SDR and custom Python scripts to intercept 315/433 MHz signals, decode fixed codes via GNU Radio, and replay them.

Global Implications and Collision Risks

The vulnerabilities extend beyond Ecuador.

Learning code chips, such as EV1527, are used globally in vehicles, garage doors, and IoT devices, creating a collision risk where one key fob could unlock multiple systems.

With thousands of KIA Ecuador vehicles already on the roads and new vulnerable units sold daily, the 1-million-code pool is nearing saturation.

Risk FactorCVE-2025-6029CVE-2025-6030
CVSS 3.1 Score9.49.4
Attack VectorReplay/Brute ForceBackdoor Injection
Affected ModelsKia Soluto, Rio, Picanto (2022–2025)Kia Homologated Aftermarket KES
MitigationReplace with rolling code fobsDisable learning code slots

Industry Response and Remediation Challenges

KIA Ecuador has not addressed the flaws since their disclosure in May 2024, prompting the Automotive Security Research Group (ASRG) to intervene.

Dealerships compound the issue by tying warranties to insecure fobs, leaving owners vulnerable. Erazo urges:

  • Consumers: Demand rolling code fobs and RF-blocking pouches.
  • Regulators: Mandate cybersecurity audits for homologated automotive components.

The lack of remediation highlights systemic gaps in Latin America’s automotive cybersecurity infrastructure, emphasizing the need for global standards to phase out learning codes.

This research underscores the urgent need to retire outdated learning code systems in favor of modern cryptographic solutions.

With automotive thefts rising in Ecuador and beyond, manufacturers must prioritize security over cost-cutting before hackers exploit these flaws at scale.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here