That upgrade shields owners from threats whether or not consumers have updated the software in their own vehicles.Equipped with Uconnect 5, the 2021 Chrysler Pacifica and all-new 2021 Jeep® Grand Cherokee L Take Two Spots on Wards 10 Best User Experience List In addition, FCA says that it has upgraded the Uconnect network to prevent hacks like the one we discussed on Wednesday.
Those who don't want to wait can download the fix from, put it onto their own jump drive, and install the upgrade that way.
They can use the USB drive that will accompany the recall notice to apply the update themselves or, It's also interesting because it can be carried out in so many ways:Ĭonsumers can visit a dealership, where mechanics will apply the fix in about 30 - 45 minutes The FCA recall is interesting because it's among the first we've seen intended to stop hackers from taking control of vehicles. The recall is limited to vehicles equipped with 8.4-inch touchscreens.įCA says that it "is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents" apart from the hacking demo reported in the media. vehicles that may suffer from the security vulnerability. The company has issued an official recall for 1.4 million U.S. Today, FCA stepped up its efforts to nip this problem in the bud.
However, the company also said that it would contact owners whose vehicles were affected by the flaw and let them know about an important software upgrade available online or at their dealer. To counter some of the coverage of that event, Fiat Chrysler Automobiles quickly published a blog post reiterating that " there has not been a single real world incident of an unlawful or unauthorized remote hack into any FCA vehicle".
(They could've chosen any number of vehicles from a wide range of automakers, but determined that the Cherokee was best suited for their demonstration.) _ Follow The Car Connection on Facebook, Twitter and Google+.Įarlier this week, we reported on a vulnerability in Chrysler's Uconnect system that allowed two hackers to remotely control a Jeep Cherokee. Unsure whether your vehicle needs the update? Visit and enter your VIN, or call FCA US Customer Care at 80. That upgrade shields owners from threats whether or not consumers have updated the software in their own vehicles. It's also interesting because it can be carried out in so many ways: Consumers can visit a dealership, where mechanics will apply the fix in about 30 - 45 minutes They can use the USB drive that will accompany the recall notice to apply the update themselves or, Those who don't want to wait can download the fix from, put it onto their own jump drive, and install the upgrade that way. THE NEW FACE OF RECALLS? The FCA recall is interesting because it's among the first we've seen intended to stop hackers from taking control of vehicles. FCA says that it "is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents" apart from the hacking demo reported in the media. The list of makes and models includes: 2015 Chrysler 200 2015 Chrysler 300 2015 Dodge Challenger 2015 Dodge Charger 2014-2015 Dodge Durango 2013-2015 Dodge Viper 2014-2015 Jeep Cherokee 2014-2015 Jeep Grand Cherokee 2013-20, 25 pickups 2013-20, 4500, 5500 chassis cabs The recall is limited to vehicles equipped with 8.4-inch touchscreens.
(They could've chosen any number of vehicles from a wide range of automakers, but determined that the Cherokee was best suited for their demonstration.) To counter some of the coverage of that event, Fiat Chrysler Automobiles quickly published a blog post reiterating that " there has not been a single real world incident of an unlawful or unauthorized remote hack into any FCA vehicle". Earlier this week, we reported on a vulnerability in Chrysler's Uconnect system that allowed two hackers to remotely control a Jeep Cherokee.