2010 Jeep Sport on 2040-cars
Valley Stream, New York, United States
For Sale By:Dealer
Engine:3.7L 226Cu. In. V6 GAS SOHC Naturally Aspirated
Body Type:Sport Utility
Fuel Type:GAS
Transmission:Automatic
Year: 2010
Make: Jeep
Model: Liberty
Disability Equipped: No
Trim: Sport Sport Utility 4-Door
Doors: 4
Drivetrain: Four Wheel Drive
Drive Type: 4WD
Mileage: 26,610
Number of Cylinders: 6
Sub Model: Sport
Jeep Liberty for Sale
- Awesome in winter jeep sport suv 3.7l v6 4x4 cd mp3 we finance(US $14,999.00)
- 2012 sport suv 3.7l cd rwd power steering temporary spare tire a/c abs(US $15,829.00)
- 2003 jeep liberty limited sport utility 4-door 3.7l(US $2,800.00)
- 2010 jeep 4wd 4dr sport
- 2005 jeep liberty 4x4 limited - chrome rims - sunroof - 25k miles! no reserve!
- 02 jeep liberty limited edition 4x4 no reserve
Auto Services in New York
Walton Service Ctr ★★★★★
Vitali Auto Exchange ★★★★★
Vision Hyundai of Canandaigua ★★★★★
Tony B`s Tire & Automotive Svc ★★★★★
Steve`s Complete Auto Repair ★★★★★
Steve`s Auto & Truck Repair ★★★★★
Auto blog
Jeep in St. Louis hacked from Pittsburgh
Tue, Jul 21 2015One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.
Jeep Renegade and Fiat 500X finally on the way to dealers
Mon, Jun 1 2015After a brief pause, the Jeep Renegade and Fiat 500X are on their way to dealers again. While initially reported as a software bug, the issue had nothing to do with the models themselves. According to a statement from FCA US to Autoblog, the "vehicles were built with an atypical Vehicle Identification Number that may not be recognized as valid by some computer systems." That problem has now been fixed. FCA US held the compact crossovers back from dealers until the company could rectify the bug. If the CUVs had been delivered, there would have been difficulty registering the vehicles, according to Automotive News. Before discovering the situation, about 20 of these Renegades were sold to customers. FCA CEO Sergio Marchionne originally discussed the predicament in late May. "I'm having a very bad engineering day," he said. "It's a combination of attributes of that vehicle that is making my life horrible." While the boss predicted the problem would be fixed as late as mid-June, the company apparently got things working much quicker than that. Related Video: FCA US Statement A limited number of 2015 Jeep Renegade and 2016 Fiat 500X vehicles were built with an atypical Vehicle Identification Number (VIN) that may not be recognized as valid by some computer systems. This VIN issue has been resolved. FCA US has been working with governmental agencies, insurers and financial institutions with whom customers may interact to ensure successful registration, financing and insurance coverage. Renegade and 500X vehicles are being shipped and are in stock at dealerships for purchase. The VIN issue is entirely separate from the operation of the vehicle.
How to update and secure a vulnerable Chrysler Uconnect system
Sat, Jul 25 2015If you own one of the 1.4 million vehicles affected by the recent Chrysler software recall, you may want to watch this video. In it, we explain how to get the latest infotainment software loaded onto the 8.4-inch Uconnect system. The recall was a response to the findings of researchers who were able to hack into and remotely control a 2014 Jeep Cherokee through its cellular connection. Although Fiat Chrysler has worked with Sprint to plug most of the holes on the carrier side, there are still some vulnerabilities that only this latest software version can patch. Owners have three options to get the update: download it now, wait for a USB stick in the mail, or take the vehicle to an FCA dealer. Chrysler will be sending USB sticks loaded with the software update to customers. Anyone with an internet connection and a USB stick of their own with at least 4 GB capacity can speed things up by downloading the patch from the Uconnect website. We cover that process from start to finish in the video, with the final portion still applicable to those using the FCA-supplied USB stick. If after watching this you still don't want to tackle the patch yourself, you can take your vehicle to the dealer to have it done. Also note that this process is the same for all Uconnect updates, not just the one patching the exploits. Our demonstrator vehicle is a 2015 Ram 1500 pickup. The procedure should be very similar on other products with the 8.4-inch Uconnect system, with only the location of the USB port varying. Once you have the USB stick with the software on it – either after having downloaded it yourself or receiving it in the mail from Chrysler – the installation process is relatively simple. It takes about 15 minutes to perform the update; we edited out the wait in the video. To check whether or not your car's 8.4-inch Uconnect system is running the latest software, go to System Information on the touch screen's Settings page and look at Software Version. The update related to the recall is version 15.17.5. Related Video: Recalls Chrysler Dodge Jeep RAM Safety Technology Infotainment Videos Original Video hacking
2040Cars.com © 2012-2024. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this Web site constitutes acceptance of the 2040Cars User Agreement and Privacy Policy.
0.039 s, 7783 u