Cybersecurity Challenges in Software-Defined Buses
Software-defined buses face rising cyber threats, highlighted by Norway’s 850-bus OTA vulnerability. Explore real attacks on transit systems, expanding attack surfaces, R155/R156 regulatory requirements, and advanced defense strategies to protect connected and electric bus fleets.
SDV


"Connected Buses,
Connected Risks,
Secure
the Fleet Before
It's Too Late."
November 2024, Norwegian Mountain Facility: Inside a mountain bunker designed to block all external signals, cybersecurity experts from Telenor Group and the University of South-Eastern Norway conducted controlled tests on electric buses. Their discovery sent shockwaves through European transit systems: approximately 850 Yutong electric buses operating across Norway could theoretically be disabled remotely through their over-the-air update systems. While no actual attacks occurred, the vulnerability was real—and investigations immediately launched across Denmark, the UK, and Australia.
This wasn't a theoretical research paper or conference presentation. It was a real-world demonstration that software-defined buses, for all their operational advantages, had become potential targets for remote manipulation. The incident crystallized a truth that the transit industry could no longer ignore: as buses evolve into connected, software-driven platforms, cybersecurity transforms from IT concern to life-safety imperative.
The global vehicle cybersecurity market, valued at approximately $3.15 billion in 2020, is projected to reach $16.2 billion by 2035, reflecting an 18.7% compound annual growth rate. This explosive growth underscores the escalating demand for robust security frameworks as buses become increasingly connected and software-dependent.
But here's the critical challenge: How do you defend vehicles that are simultaneously safety-critical infrastructure, mobile computing platforms, and public-facing services? How do you balance the operational benefits of connectivity against the existential risks of compromise?
The Real-World Wake-Up Calls: When Theory Became Reality
850
Yutong buses found vulnerable in Norway (Nov 2024)
$4.4M
Average data breach cost in transportation sector (IBM 2024)
$16.2B
Global vehicle cybersecurity market by 2035
500+
VicOne Cybersecurity Competition participants (2025)
Case Study: The Yutong Vulnerability Discovery
The Setup:
• 850 Yutong electric buses operating across Norway
• Cloud-integrated OTA update systems
• Manufacturer direct digital access for battery management, diagnostics
• Tests conducted in signal-blocking mountain facility
The Vulnerability:
• Theoretical remote shutdown capability identified
• OTA update channels provided manufacturer access to critical systems
• While Yutong maintained "no physical connection" to steering/braking, the incident exposed risks
• Investigations launched across Europe and Australia
"As buses incorporate more integrated technologies, we have a technological window of time to implement necessary security measures right now."
— Bernt Reitan Jenssen, CEO, Ruter
US Transit System Breaches: The Operational Disruption Reality
While the Norwegian discovery was theoretical, US transit systems experienced actual operational impacts:
The Expanding Attack Surface: Where Vulnerabilities Hide
Modern software-defined buses present threat actors with multiple entry points. The increased connectivity creates numerous access points into internal vehicle networks, each presenting multiple software vulnerabilities that adversaries can exploit.
November 2024: Norwegian Transport Operator Ruter's Discovery
The Ripple Effect:
• Denmark's Movia: Immediate investigation of 469 Chinese-made electric buses (262 Yutong models)
• United Kingdom: Scrutiny of approximately 700 Yutong buses nationwide
• Australia: Review of fleet security protocols initiated
• Regulatory response: Accelerated EU cybersecurity compliance timelines
These weren't sophisticated nation-state attacks. They were opportunistic ransomware and phishing campaigns that succeeded because transit systems presented soft targets with inadequate defenses.
Passenger Wi-Fi: The Trojan Horse
Cybersecurity research demonstrated how attackers could use a bus's guest Wi-Fi to access and compromise critical systems. The attack chain:
Step 1: Connect to public bus Wi-Fi (no authentication required)
Step 2: Exploit vulnerabilities in IoT gateway separating networks
Step 3: Lateral movement to telematics gateway unit (TGU)
Step 4: Access CAN bus—the vehicle's nervous system
Step 5: Inject malicious commands affecting steering, braking, transmission
Implication: Without strong encryption and network segmentation, passenger convenience features become attack vectors into safety-critical systems.
Over-the-Air Update Channels: Double-Edged Sword
OTA updates enable operational efficiency—but also create persistent remote access channels. Compromise points include:
Source code repositories: Attackers infiltrating development environments
Open-source dependencies: Malicious code in third-party libraries
Software update servers: Man-in-the-middle attacks during transmission
Voltage fault injection: Hardware attacks on chipmaker processors
2021 Near-Miss: European agency's fleet management system compromised via contractor phishing. Attackers gained OTA server access. If deployed, 340 buses could have been disabled during rush hour. Prevented loss: €15M+.
Supply Chain Vulnerabilities: The Hidden Time Bomb
The automotive supply chain has become a prime target. McKinsey projects connectivity services could add up to $1.5 trillion by 2030. However, vulnerabilities compound risks:
Subsystem integration risk: Modern 12m bus contains components from 15-25 suppliers
Firmware backdoors: Malicious code inserted at component level
Legacy protocol vulnerabilities: HVAC, lighting using decades-old protocols
Update complexity: Each supplier's components on different schedules
Attack Surface Expansion in Software-Defined Buses
Regulatory Frameworks: From Voluntary to Mandatory
Recognition of these threats has spurred aggressive regulatory action worldwide. The era of "security through obscurity" has ended—replaced by mandated cybersecurity management systems and continuous compliance verification.
"Our vehicles are equipped with cybersecurity management systems from the design phase to detect, prevent, and respond to cyber threats. These systems continuously monitor potential cyberattacks, alert operators, and deploy countermeasures to neutralize attacks."
— Philippe Grand, Bus Digital Product Manager, Iveco Bus
UNECE R155/R156: The European Foundation
UNECE Regulation 155 (Cybersecurity Management System) and Regulation 156 (Software Update Management System) entered into force in January 2021. In the European Union, these regulations became mandatory for all new vehicle types from July 2022 and mandatory for all new vehicles produced from July 2024.
R155 Requirements include:
Risk-based cybersecurity system spanning vehicle's entire lifecycle (design → production → operation → decommissioning)
Protection of safety-critical functions: Type-approval authorities verify ECUs affecting safety cannot be compromised via external connectivity
Vulnerability management: Continuous monitoring, incident response, remediation tracking
Supply chain security: Assessment of supplier cybersecurity practices
Iveco Bus Implementation: With over 10,000 connected buses and coaches, Iveco achieved comprehensive R155 compliance including:
Cybersecurity measures integrated from design phase
Electrical/electronic units protected by mechanical locking + secure gateway
Penetration testing, security audits, third-party certifications
Software update management ensuring protection against emerging threats
US Department of Commerce Regulations
In January 2025, the US Department of Commerce finalized regulations establishing strict prohibitions against the import and sale of connected vehicle components containing Vehicle Connectivity System or Automated Driving System technologies with ties to China or Russia.
While initially focused on passenger vehicles under 10,001 pounds, a separate rule addressing connected commercial vehicles, including buses, is anticipated. The rationale: software-defined vehicles represent potential national security risks if compromised at scale.
EU Cyber Resilience Act: The Financial Hammer
The EU's Cyber Resilience Act and ISO/SAE 21434 compliance have become essential, with companies facing fines of up to €15 million or 2.5% of global turnover for non-compliance.
This transforms cybersecurity from "best practice" to "business-critical compliance requirement" with existential financial implications for non-compliant OEMs.
Technical Mitigation Strategies: Defense in Depth
Defending software-defined buses requires a multi-layered approach combining architectural isolation, continuous monitoring, and zero-trust principles. No single technology solves the problem—comprehensive defense requires orchestrated systems.
System Segmentation: Preventing Cascade Failures
The software-defined vehicle approach offers advantages in preventing system-wide breakdowns because hardware and software are separated. Since each system is isolated—for example, the engine management system does not directly interact with the infotainment system—if one is attacked, the problem cannot automatically spread to the rest of the vehicle.


Hardware Security Foundations
Hardware components including microcontrollers, sensors, and communications modules should be evaluated against industry-specific standards to ensure necessary security features and resistance to tampering.
Key Technologies:
Hardware Security Modules (HSMs): Tamper-resistant devices performing cryptographic operations





