Find or Sell Used Cars, Trucks, and SUVs in USA

2024 Chrysler Pacifica Touring L on 2040-cars

US $43,945.00
Year:2024 Mileage:5 Color: White /
 Black
Location:

Body Type:Minivan/Van
Engine:3.6L V6 24V VVT
For Sale By:Dealer
Fuel Type:Gasoline
Transmission:Automatic
Vehicle Title:Clean
Year: 2024
VIN (Vehicle Identification Number): 2C4RC1BGXRR190181
Mileage: 5
Drive Type: FWD
Exterior Color: White
Interior Color: Black
Make: Chrysler
Manufacturer Exterior Color: Bright White Clear Coat
Manufacturer Interior Color: Black/Alloy/Black
Model: Pacifica
Number of Cylinders: 6
Number of Doors: 4 Doors
Sub Model: Touring L 4dr Mini-Van
Trim: Touring L
Condition: New: A vehicle is considered new if it is purchased directly from a new car franchise dealer and has not yet been registered and issued a title. New vehicles are covered by a manufacturer's new car warranty and are sold with a window sticker (also known as a “Monroney Sticker”) and a Manufacturer's Statement of Origin. These vehicles have been driven only for demonstration purposes and should be in excellent running condition with a pristine interior and exterior. See the seller's listing for full details. See all condition definitions

Auto blog

NHTSA looking into non-Takata airbag shrapnel case

Tue, Jul 14 2015

The global airbag inflator recall from Takata has been one of the biggest topics in auto safety for months. Now, the National Highway Traffic Safety Administration is opening a preliminary evaluation into the components from Arc Automotive to investigate whether two reported ruptures and two injuries signal a wider problem. So far, only the 2002 Chrysler Town & Country and 2004 Kia Optima are believed to be affected. If a safety campaign is deemed necessary, it could cover an estimated 420,000 of the minivans and 70,000 of the Korean sedans. NHTSA first noticed these ruptures in December 2014. The agency received a complaint of a 2009 case in Ohio about the bursting of the driver's side inflator in a 2002 Town & Country. According to the report, the incident broke the woman's jaw and sent shrapnel into her chest. The government investigated the case, and this was found to be the only known occurrence in these vehicles. The analysis indicated the part's gases were possibly blocked somehow and caused the component to explode. FCA US spokesperson Eric Mayne told Autoblog that the company is "cooperating fully" with NHTSA. "Also, we no longer use that inflator," he said. A second incident came to NHTSA's attention in June 2015 with the driver's side rupture in a 2004 Optima in New Mexico. The agency lists fewer details about the case, and a root cause isn't known. This is also the only currently known example in a Kia vehicle. According to a statement from Kia to Autoblog, "We are taking this matter very seriously and support NHTSA's action and will continue working cooperatively with the agency and suppliers throughout the process." Arc's components are sealed within a steel housing that's meant to protect them from "external atmospheric conditions," according to NHTSA. Multiple suppliers also use them. In the Chrysler, the airbag module came from Key Safety Systems and from Delphi in the Kia. In a statement to Autoblog the company said, "We have received NHTSA's notification and are cooperating fully with its Preliminary Evaluation." At this time, NHTSA admits that it doesn't know for certain whether these two cases are linked. The agency is conducting this preliminary evaluation to learn more.

Jeep in St. Louis hacked from Pittsburgh

Tue, Jul 21 2015

One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.

FCA issuing software update for 1.4M vehicles to prevent hacking

Fri, Jul 24 2015

In the wake of a Jeep Cherokee being hacked remotely while on the road through its Uconnect infotainment system, FCA US is now issuing a software update for 1.4 million vehicles in the United States. Affected customers will receive a USB stick in the mail with the improved version; owners can check this website to see if their cars are affected. A large variety of models with FCA's 8.4-inch touchscreen infotainment system are affected. They include the 2015 Chrysler 200, 2015 Chrysler 300, 2015 Dodge Charger, and 2015 Dodge Challenger; 2013-2015 Dodge Viper; 2013-2015 Ram 1500, 2500, and 3500; 2013-2015 Ram 3500, 4500, and 5500 chassis cab; 2014-2015 Jeep Grand Cherokee and Cherokee; and 2014-2015 Dodge Durango. According to FCA in its announcement, the new software "insulates connected vehicles from remote manipulation." As of July 23, the company also "fully tested and implemented within the cellular network" additional security to prevent access to many of a vehicle's systems. FCA US says that it's conducting this campaign out of an abundance of caution and disputes the notion that there's a defect with these vehicles. Beyond the demonstration of the hack in the Cherokee, the automaker says that it's unaware of any other reports of these attacks actually happening. Related Video: Statement: Software Update July 24, 2015 , Auburn Hills, Mich. - FCA US LLC is conducting a voluntary safety recall to update software in approximately 1,400,000 U.S. vehicles equipped with certain radios. The recall aligns with an ongoing software distribution that insulates connected vehicles from remote manipulation, which, if unauthorized, constitutes criminal action. Further, FCA US has applied network-level security measures to prevent the type of remote manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems and were fully tested and implemented within the cellular network on July 23, 2015. The Company is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents – independent of the media demonstration.