2000 Jeep Grand Cherokee Laredo Sport Utility 4-door 4.0l on 2040-cars
East Northport, New York, United States
2000 Jeep 4 Wheel Drive! Grand Grand Cherokee Laredo, 119500 miles, sunroof,
power windows, locks, seats, cruise control. It features an automatic transmission, 4- wheel drive, and a 4.0 liter 6 cylinder engine. It Needs wheel alignment and Left rear wheel rim replacement. $450.00 approximate cost of repairs Cell 212-433-0310 Saad Options Installed On Mar-15-14 at 11:40:49 PDT, seller added the following information: BUY IT NOW $1,800.00 On Mar-16-14 at 16:51:30 PDT, seller added the following information: Serious Buyers Only,If you need to see or inspect the vehicle before you buy, please do so before you place your bid |
Jeep Grand Cherokee for Sale
2006 jeep grand cherokee srt8 sport utility 4-door 6.1l(US $21,999.00)
2002 jeep grand cherokee limited sport utility 4-door 4.0l(US $4,500.00)
2002 jeep grand cherokee laredo sport utility 4-door 4.0l
2007 jeep grand cherokee ltd hemi sunroof leather nav texas direct auto(US $16,980.00)
2002 jeep grand cherokee(US $4,995.00)
2004 jeep grand cherokee laredo sport utility 4-door 4.7l
Auto Services in New York
Wayne`s Auto Repair ★★★★★
Vk Auto Repair ★★★★★
Village Auto Body Works Inc ★★★★★
TOWING BROOKLYN TODAY.COM ★★★★★
Total Performance Incorporated ★★★★★
Tom & Arties Automotive Repair ★★★★★
Auto blog
Hackers arrested after stealing more than 30 Jeeps in Texas
Fri, Aug 5 2016This article has been updated with details on how the thefts were carried out, and with comments from FCA. It seems the news regarding vehicle hacking continues to get worse, especially when it comes to products from Fiat Chrysler Automobiles. Last year, a Jeep Cherokee in St. Louis, Missouri, was wirelessly hacked from Pittsburgh. Nissan had to shut down its Leaf app because of vulnerabilities. Now, a pair of hackers in Houston, Texas, stole more than 30 Jeeps over a six-month period. The two were arrested by police last Friday while attempting to steal another vehicle. ABC 13 in Houston reports that police had been following Michael Arcee and Jesse Zelay for several months but were unable to catch them in the act until now. The two were using a laptop to connect to and start a vehicle. The thieves were able to access Fiat Chrysler's own DealerCONNECT software. After entering the vehicle identification number, the hackers were able to reprogram the cars' security systems to accept a generic key, according to The Houston Chronicle. Additionally, Automotive News reports that FCA subsequently updated the terms of use for its DealerCONNECT program. These thefts were not related to the UConnect remote hacks from last year. This content is hosted by a third party. To view it, please update your privacy preferences. Manage Settings. In April, this surveillance video showed the theft of a Jeep Wrangler Unlimited. It was this footage that first led the police to Arcee and Zelay. The police began to follow and record the pair. That investigation eventually led to Friday's arrest. Both are charged with unauthorized use of a motor vehicle. In addition, Arcee is charged with felon in possession of a weapon and possession with intent to deliver a controlled substance. According to ABC 13, Homeland Security is investigating more than 100 stolen FCA vehicles that they believe were hacked using this method. After their theft, the vehicles were brought across the border to Mexico. FCA is currently conducting an internal investigation into the matter. After this article was posted, the company reached out to Autoblog, stating "FCA US takes the safety and security of its customers seriously and incorporates security features in its vehicles that help to reduce the risk of unauthorized and unlawful access to vehicle systems and wireless communications. FCA US has been cooperating with Houston Police Department since they first started the investigation.
Feds fretting over remote hack of Jeep Cherokee
Fri, Jul 24 2015A cyber-security gap that allowed for the remote hacking of a Jeep Cherokee has federal officials concerned. An associate administrator with the National Highway Traffic Safety Administration said Thursday that news of the breach conducted by researchers Chris Valasek and Charlie Miller had "floated around the entire federal government." "The Homeland Security folks sent out broadcasts that, 'Here's an issue that needs to be addressed,'" said Nathaniel Beuse, an associate administrator with the National Highway Traffic Safety Administration. Valasek and Miller commandeered remote control of the Cherokee through a security flaw in the cellular connection to the car's Uconnect infotainment system. From his Pittsburgh home, Valasek manipulated critical safety inputs, such as transmission function, on Miller's Jeep as he drove along a highway near St. Louis, MO. The scope of the remote breach is believed to be the first of its kind. The prominent cyber-security researchers needed no prior access to the vehicle to perform the hack, and the scope of the remote breach is believed to be the first of its kind. A NHTSA spokesperson said the agency's cyber-security staff members are "putting their expertise to work assessing this threat and the response, and we will take action if we determine it's necessary to protect safety." A Homeland Security spokesperson referred questions about the hack to Chrysler. Fiat Chrysler Automobiles has already been the subject of a federal hearing this month, in which officials scrutinized whether the company had adequately fixed recalled vehicles and repeatedly failed to notify the government about defects. But cyber-security concerns are a new and different species for the regulatory agency. Only hours before the Jeep hack was announced by Wired magazine earlier this week, NHTSA administrator Dr. Mark Rosekind said hacking vulnerabilities were a threat to privacy, safety, and the public's trust with new connected and autonomous technologies that allow vehicles to communicate. NHTSA outlined its response to the cyber-security challenges facing the industry in a report issued Tuesday. In it, the agency summarized its best practices for thwarting attacks and said it will analyze possible real-time infiltration responses. But the agency's ability to handle hackers may only go so far.
NHTSA investigates FCA for SUVs that roll out of Park
Tue, Aug 25 2015The National Highway Traffic Safety Administration is opening a preliminary evaluation into the 2014 Dodge Durango and 2014-205 Jeep Grand Cherokee after 14 complaints of the SUVs rolling out of Park. An estimated 408,000 of them could be affected, if a recall is necessary. All of the current complaints submitted to NHTSA about the issue concern the Grand Cherokee, and the claims allege that the SUV can roll out of Park whether or not the engine is running. Some folks report that they check the indicator each time because the gear sometimes fails to engage. Among the 14 cases, there are five accounts of crashes and three injuries, including a situation with someone allegedly being rolled over. NHTSA's preliminary evaluations are meant to investigate "the scope, frequency, and safety-related consequence" of a reported problem. They don't necessarily lead to a recall. Related Video: INVESTIGATION Subject : Unattended vehicle rollaway Date Investigation Opened: AUG 20, 2015 Date Investigation Closed: Open NHTSA Action Number: PE15030 Component(s): POWER TRAIN All Products Associated with this Investigation Vehicle Make Model Model Year(s) DODGE DURANGO 2014 JEEP GRAND CHEROKEE 2014-2015 Details Manufacturer: Chrysler (FCA US LLC) SUMMARY: The Office of Defects Investigation (ODI) has received 14 complaints (VOQs) alleging that after being placed in Park the subject vehicles have then rolled away from their parked position. The unintended motion has occurred with both the engine off and the engine running. ODI has also identified EWR field report data related to the alleged defect. The model year 2014 and 2015 Jeep Grand Cherokee vehicles are equipped with an electronic gear selector (shift-by-wire system). The gear selection is made by pressing the shifter-paddle forward or backwards; the shifter does not move along a gate path as with conventional gear selectors. A Preliminary Evaluation has been opened to asses the scope, frequency, and safety-related consequence of the alleged defect. The VOQs associated with the opening of this investigation are: 10733158, 10730952, 10683556, 10679497, 10583366, 10725429, 10715401, 10711893, 10676998, 10668651, 10662619, 10662308, 10605865, and 10567538.