Suv 4 Door Hardtop Rubicon Leather Nav Custom Lift Wheels Tires Low Miles Auto on 2040-cars
American Fork, Utah, United States
Engine:3.6L 3604CC 220Cu. In. V6 GAS DOHC Naturally Aspirated
For Sale By:Dealer
Body Type:Sport Utility
Transmission:Automatic
Fuel Type:GAS
Make: Jeep
Options: Compact Disc
Model: Wrangler
Safety Features: Anti-Lock Brakes, Driver Side Airbag
Trim: Unlimited Rubicon Sport Utility 4-Door
Power Options: Air Conditioning, Cruise Control, Power Windows
Drive Type: 4WD
Doors: 4
Mileage: 6,296
Engine Description: 3.6L V6 SFI DOHC 24V
Sub Model: Rubicon
Drivetrain: 4-Wheel Drive
Exterior Color: White
Interior Color: Black
Number of Cylinders: 6
Warranty: Vehicle has an existing warranty
Jeep Wrangler for Sale
Starwood custom! porsche gt silver kevlar! bentley mulliner leather! aev hood!(US $53,688.00)
Starwood custom! canyon ranch pkg! saddle leather! power boards! skyjacker(US $92,888.00)
Starwood custom! smittybilt bumper/winch! kevlar liner! 4 suspension lift!(US $50,583.00)
2006 jeep wrangler "the last eagle"
2004 jeep wrangler unlimited sport utility 2-door 4.0l
5 speed manual rat rod hot rod custom project rock crawler low reserve
Auto Services in Utah
The Inspection Station ★★★★★
Stevens Electric Motor Shop ★★★★★
S & H Glass ★★★★★
Natural Solutions ★★★★★
Midas Auto Service Experts ★★★★★
Lone Peak Collision Repair ★★★★★
Auto blog
Autoblog Minute: FCA issues Uconnect software update amid hacking fears
Wed, Jul 29 2015Carjacking has gone wireless, as automakers and Congress scramble for a solution after a disturbing video on Wired showed a pair of researchers controlling a Jeep Cherokee remotely. Autoblog's Adam Morath and David Gluckman report on this edition of Autoblog Minute. Show full video transcript text [00:00:00] Carjacking has gone wireless, as automakers and Congress scramble for a solution. I'm Adam Morath and this is your Autoblog Minute. Cars with wireless connections are susceptible to remote hacking, as demonstrated in a disturbing video on Wired.com. The segment showed two researchers remotely controlling a Jeep Cherokee, including running vehicle's the wipers, turning up the music, and ultimately shutting down [00:00:30] the Jeep while it was being driven on the highway by Wired senior writer Andy Greenberg. Washington took note. A press release issued from the desks of senators Ed Markey and Richard Blumenthal introduces legislation protecting drivers from auto security privacy risks. Fiat Chrysler, parent company of Jeep, has a solution for its customers. For more we go to Autoblog's David Gluckman. [GLUCKMAN INTERVIEW] Chrysler has worked with the Uconnect cellular provider Sprint to plug security holes on the carrier side. The vehicles themselves can't be updated wirelessly, so [00:01:00] the remaining changes require physical access. For that, customers have three options: One, download the Uconnect software update to a USB stick and install. Two, wait for FCA to send a USB stick with the latest software that they can install, or third, visit a dealer. Owners should do what they're most comfortable with. I made a video that walks through the whole process from download to install and it took about a half hour. [MORATH] David's full video tutorial of how to install the Uconnect fix can be seen on Autoblog. [00:01:30] It remains to be seen how the rest of the auto industry will respond to these security risks. For Autoblog, I'm Adam Morath. Related Video: Autoblog Minute is a short-form news video series reporting on all things automotive. Each segment offers a quick and clear picture of what's happening in the automotive industry from the perspective of Autoblog's expert editorial staff, auto executives, and industry professionals.
Chrysler recalling nearly half a million Durangos and Grand Cherokees
Fri, Feb 27 2015Rule number one of public relations – save the bad news for Friday. Fiat Chrysler has adhered to that, announcing today that it'd be voluntarily recalling 467,480 SUVs. This latest recall could actually be thought of as a continuation of a September 2014 recall, relating to the fuel-cell relay. In that case, some 188,723 Dodge Durango and Jeep Grand Cherokee CUVs from model year 2011 were recalled. And this time, it's the Durango and GC in trouble again. FCA is adding crossovers from model years 2012 and 2013 to the fuel-pump recall, although only diesel-powered Jeeps with the 3.0-liter V6 that were sold outside of North America are affected this time around. As with the previous recall, deformities in the fuel-pump relay, which could affect its functioning. In most cases, FCA reports that the affected vehicles simply won't start, although they also could be prone to stalling. A new relay circuit will be installed that promises increase durability. Of the 467,480 vehicles being recalled, 338,216 were sold in the US market, 18,991 went to Canada and 10,829 were shipped south of the border, to Mexico. Outside of the NAFTA region, FCA is recalling 99,444 vehicles. No injuries or accidents have been associated with this recall. Statement: Fuel-Pump Relay February 27, 2015 , Auburn Hills, Mich. - FCA US LLC is voluntarily recalling an estimated 467,480 SUVs worldwide to install new a relay circuit that improves fuel-pump relay durability. FCA US engineers have determined a condition identified in a previous investigation may extend to additional vehicles. The previous investigation, which led to a recall, traced a pattern of repairs to fuel-pump relays that are susceptible to deformation. This may affect fuel-pump function, preventing a vehicle from starting, or leading to engine stall. Of the two scenarios, the no-start condition is the more common. FCA US is unaware of any related injuries or accidents. The fuel-pump relay is located inside the Totally Integrated Power Module (TIPM), which also helps manage other vehicle functions. None of these other functions, including air-bag deployment, is affected by the fuel-pump relay. The new campaign affects an estimated 338,216 vehicles in the U.S.; 18,991 in Canada; 10,829 in Mexico and 99,444 outside the NAFTA region. Covered are model-year 2012 and 2013 Dodge Durango full-size SUVs and non-NAFTA 2011 Jeep Grand Cherokee mid-size SUVs equipped with 3.0-liter diesel engines.
Jeep in St. Louis hacked from Pittsburgh
Tue, Jul 21 2015One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.