Jeep Renegade recalled to prevent hacking
Fri, Sep 4 2015 Jeep is issuing a voluntary recall of some 7,800 Renegades over fears that their radios may be vulnerable to hacking. The company is quick to stress that this campaign is independent of the hacking scare earlier this year.Only Renegades fitted with the 6.5-inch touchscreen display are affected by the recall. Owners of the affected vehicles will be mailed a USB jump drive that they can plug into their vehicle for a free software update. Alternatively, owners can head over to the UConnect website, enter their VIN, and download the software to their own jump drive. (See how in our video below.) Dealers will also perform the upgrade free of charge. The software update provides "additional security features," that should prevent remote tampering.
If this sounds worrying, it's actually not that huge of a problem. First, Fiat Chrysler Automobiles estimates that over half the affected vehicles are still sitting on dealer lots. More importantly, according to FCA, the vulnerability on the Renegade "required unique and extensive technical knowledge, prolonged physical access to a subject vehicle and extended periods of time to write code," making it considerably different than the Cherokee problem.
No injuries or hacks have been reported by any Renegade owner.
Related Video:
Statement: Software Update
September 4, 2015 , Auburn Hills, Mich. - FCA US LLC is conducting a voluntary safety recall to update software in approximately 7,810 U.S.-market SUVs equipped with certain radios. More than half remain in dealer hands and will be serviced before they are sold.
The campaign – which involves radios that differ from those implicated in another, similar recall – is designed to protect connected vehicles from remote manipulation. If unauthorized, such interference constitutes a criminal act.
FCA US has already applied measures to prevent the type of vehicle manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems.
The Company is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents – independent of the media demonstration.
Affected are certain 2015 Jeep Renegade SUVs equipped with 6.5-inch touchscreens. Customers will receive a USB device which they may use to upgrade vehicle software. This provides additional security features.
Alternately, customers may visit http://www.driveuconnect.com/software-update/ as early as today to input their Vehicle Identification Numbers (VINs) and determine if their vehicles are included in the recall. If so, they may download the software themselves or, as early as Sept. 5, visit their dealers where technicians will perform the installation.
There is no charge for the software or, in the case of dealer visit, installation.
The security of FCA US customers is a top priority, as is retaining their confidence in the Company's products. Accordingly, FCA US has established a dedicated System Quality Engineering team focused on identifying and implementing best practices for software development and integration.
The software manipulation addressed by this recall required unique and extensive technical knowledge, prolonged physical access to a subject vehicle and extended periods of time to write code.
No defect has been found. FCA US is conducting this campaign out of an abundance of caution.
Customers are urged to acquire the software update. Those with questions or concerns may call the FCA US Customer Care Center at 1-800-853-1403.
September 4, 2015 , Auburn Hills, Mich. - FCA US LLC is conducting a voluntary safety recall to update software in approximately 7,810 U.S.-market SUVs equipped with certain radios. More than half remain in dealer hands and will be serviced before they are sold.
The campaign – which involves radios that differ from those implicated in another, similar recall – is designed to protect connected vehicles from remote manipulation. If unauthorized, such interference constitutes a criminal act.
FCA US has already applied measures to prevent the type of vehicle manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems.
The Company is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents – independent of the media demonstration.
Affected are certain 2015 Jeep Renegade SUVs equipped with 6.5-inch touchscreens. Customers will receive a USB device which they may use to upgrade vehicle software. This provides additional security features.
Alternately, customers may visit http://www.driveuconnect.com/software-update/ as early as today to input their Vehicle Identification Numbers (VINs) and determine if their vehicles are included in the recall. If so, they may download the software themselves or, as early as Sept. 5, visit their dealers where technicians will perform the installation.
There is no charge for the software or, in the case of dealer visit, installation.
The security of FCA US customers is a top priority, as is retaining their confidence in the Company's products. Accordingly, FCA US has established a dedicated System Quality Engineering team focused on identifying and implementing best practices for software development and integration.
The software manipulation addressed by this recall required unique and extensive technical knowledge, prolonged physical access to a subject vehicle and extended periods of time to write code.
No defect has been found. FCA US is conducting this campaign out of an abundance of caution.
Customers are urged to acquire the software update. Those with questions or concerns may call the FCA US Customer Care Center at 1-800-853-1403.
By Brandon Turkus
See also: Texas student drives Barbie Jeep to school after DWI, Autoblog Minute: Wrangler production to remain in Toledo, pickup may come, Jeep Wrangler Stays in Toledo, Cherokee Leaves | Autoblog Mintue.