The Depollution Process and Its Hidden Danger
When a car reaches the end of its life, it goes through a depollution process at an Authorized Treatment Facility. During this procedure, a mechanic connects to the vehicle’s On-Board Diagnostics system and issues a single command to activate airbags, release seat belt pre-tensioners, disable the Anti-Lock Braking System, power down engine controls, and cripple the transmission. This is done to safely remove toxic materials and prepare the carcass for scrap metal recycling.
However, this routine process reveals a significant vulnerability. The same OBD command that allows a legitimate mechanic to deactivate a car’s safety systems could be weaponized by an attacker. Because the Motor Vehicle Owners’ Right to Repair Act guarantees anyone the ability to work on their vehicle without going to a dealership, the OBD port remains accessible. A hacker could exploit this remotely through a compromised OBD app or by entering the CAN bus wirelessly, triggering the depollution command while the vehicle is in motion.
Hardening ECUs as a Defense Strategy
To prevent such an attack, automotive security engineers must focus on hardening the Electronic Control Units to their factory settings. When ECUs are locked down, any deviation from the original configuration including the execution of a depollution command is blocked. This approach ensures that even if an attacker gains access to the CAN bus, they cannot force the vehicle to disable its brakes, airbags, or engine controls while driving.
Hardened ECUs eliminate both false positives and false negatives by strictly enforcing factory-defined behavior. This represents a critical layer of defense for connected vehicles, especially as more cars gain remote access capabilities through apps and telematics systems. Without such protections, the very tools designed to safely retire old cars could become a zero-day threat to vehicles still on the road.
Source: Karambasecurity

