News: 1766088780

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Your car’s web browser may be on the road to cyber ruin

(2025/12/18)


Web browsers for desktop and mobile devices tend to receive regular security updates, but that often isn't the case for those that reside within game consoles, televisions, e-readers, cars, and other devices. These outdated, embedded browsers can leave you open to phishing and other security vulnerabilities.

Researchers affiliated with the DistriNet Research Unit of KU Leuven in Belgium have found that newly released devices may contain browsers that are several years out of date and include known security bugs.

In a [1]research paper [PDF] presented at the USENIX Symposium on Usable Privacy and Security (SOUPS) 2025 in August, computer scientists Gertjan Franken, Pieter Claeys, Tom Van Goethem, and Lieven Desmet describe how they created a crowdsourced [2]browser evaluation framework called [3]CheckEngine to overcome the challenge of assessing products with closed-source software and firmware.

[4]

The framework functions by providing willing study participants with a unique URL that they're asked to enter into the integrated browser in the device being evaluated. During the testing period between February 2024 and February 2025, the boffins received 76 entries representing 53 unique products and 68 unique software versions.

[5]

[6]

In 24 of the 35 smart TVs and all 5 e-readers submitted for the study, the embedded browsers were at least three years behind current versions available to users of desktop computers. And the situation is similar even for newly released products.

"Our study shows that integrated browsers are updated far less frequently than their standalone counterparts," the authors state in their paper. "Alarmingly, many products already embed outdated browsers at the time of release; in fact, eight products in our sample included a browser that was over three years obsolete when it hit the market."

[7]

[8]According to KU Leuven , the study revealed that some device makers don't provide security updates for the browser, even though they advertise free updates.

The researchers cited several case studies that assessed the exploitability of devices with outdated browsers. The Boox Note Air 3 e-ink tablet, released in January 2024, for example, ships with the [9]NeoBrowser , which is based on Chromium 85, released in August 2020.

"Notably, across four software updates, the integrated browser remained unpatched," the researchers said, adding that the company lacked a security reporting channel and that support staff misrepresented the resolution of the problem. As a result, the authors reported the matter to the EU regulatory authorities.

[10]AI-authored code contains worse bugs than software crafted by humans

[11]Purdue makes 'AI working competency' a graduation requirement

[12]PwC on securing AI: building trust, compliance and confidence at scale

[13]Browser 'privacy' extensions have eye on your AI, log all your chats

In December 2024, the [14]EU Cyber Resilience Act came into force, initiating a transition period through December 2027, when vendors will be fully obligated to tend to the security of their products. The KU Leuven researchers say that many of the devices tested are not yet compliant.

The authors also looked at gaming applications that include an embedded browser: Steam, Ubisoft Connect, and AMD Adrenalin.

[15]

The Steam enrollments submitted through the CheckEngine framework included two browsers based on Chromium 109, from January 2023, and one that used Chromium 126, from June 2024. The researchers said that while they could not reproduce any of the three known vulnerabilities tested, they found that they could spoof the origin of alert boxes in the older versions.

"Here, by exploiting an open redirect – [16]previously discovered for a Steam domain – an attacker could craft a URL that triggers an alert box appearing to originate from a legitimate domain, which is useful for phishing attacks," the researchers said.

Ubisoft Connect's embedded browser, based on Chromium 109, also didn't yield to known vulnerabilities due to a limitation that did not allow the opening of new tabs or windows, but the authors did find the browser came configured with the --no-sandbox flag, which raised the risk of privilege escalation attacks.

With AMD Adrenalin, the KU Leuven researchers reproduced the address bar spoofing vulnerability in its Chromium 112-based browser from April 2023. AMD, they said, acknowledged the issue and was working on a fix at the time they initially presented their findings.

The authors put some of the blame on development frameworks like Electron that bundle browsers with other components.

"We suspect that, for some products, this issue stems from the user-facing embedded browser being integrated with other UI components, making updates challenging – especially when bundled in frameworks like Electron, where updating the browser requires updating the entire framework," they said in their paper. "This can break dependencies and increase development costs."

But in other cases, they suggest the issue arises from inattention on the part of vendors or a choice not to implement essential security measures.

While they suggest mechanisms like [17]product labels may focus consumer and vendor attention on updating embedded browsers, they conclude that broad voluntary compliance is unlikely and that regulations should compel vendors to take responsibility for the security of the browsers they embed in their products. ®

Get our [18]Tech Resources



[1] https://www.usenix.org/system/files/soups2025-franken.pdf

[2] https://github.com/DistriNet/CheckEngine

[3] https://checkengine.distrinet-research.be/

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aUSHiDnNocGx8l5Ndhdb6gAAAM4&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aUSHiDnNocGx8l5Ndhdb6gAAAM4&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aUSHiDnNocGx8l5Ndhdb6gAAAM4&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aUSHiDnNocGx8l5Ndhdb6gAAAM4&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[8] https://nieuws.kuleuven.be/en/content/2025/outdated-embedded-web-browsers-create-security-risks

[9] https://help.boox.com/hc/en-us/articles/10701363849108-NeoBrowser

[10] https://www.theregister.com/2025/12/17/ai_code_bugs/

[11] https://www.theregister.com/2025/12/17/purdue_require_ai_working_competency/

[12] https://www.theregister.com/2025/12/17/pwc_securing_ai_building/

[13] https://www.theregister.com/2025/12/16/chrome_edge_privacy_extensions_quietly/

[14] https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act

[15] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aUSHiDnNocGx8l5Ndhdb6gAAAM4&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[16] https://medium.com/@alcatech-security/how-i-find-open-redirect-and-rfd-on-steam-domain-7f8b27457e5a

[17] https://www.mozillafoundation.org/en/privacynotincluded/

[18] https://whitepapers.theregister.com/



This all getting absurd

ecofeco

Just absurd.

So my Mosaic is not updated?

Jou (Mxyzptlk)

Am I forced to update to Netscape?

Seriously...

Jou (Mxyzptlk)

I joked about it, but "Internet on car computer" was doomed right from the start. Carplay and Android-Car are short-lived fads, cannot be changed or updated, outdated right from the launch by design since cars (should) live longer than a typical smart-phone.

Re: Seriously...

Dan 55

Carplay and Android Auto are in effect a second screen and processing is done on the phone. Probably the best way of doing it all things considered given how often car makers update their software.

Re: Seriously...

Jimjam3

Exactly, Browser’s are constantly getting updates and it’s a regular activity on a PC that is connected to the internet.

The car makers must know this and chuck in these outdated packages just for the sales brochure. Awful practice.

Embedded insecurity

Refugee from Windows

It's the Automotive Sector. It's all done to a price and a template. Of course you could update it, except only at a dealer and for a large fee.

Think of it as a large phone that doesn't get any support.

The exception would appear to "Muskmobiles" which get updates, some of which may not be quite bug free. We're all used to ignoring the built in SatNav that is well out of date and can't find anywhere built in the last 5 years.

Re: Embedded insecurity

Mike 137

" It's the Automotive Sector

It's not just the Automotive Sector. I recently had to reconfigure someone's SOHO router (a notionally reputable brand and a "professional" model only about a year from release). The digital certificate for its web interface had expired and there seems to be no mechanism for updating it (hard coded like what Firefox did maybe?). Fortunately the web interface is only accessible from the private side, but nevertheless the browser has to be instructed to ignore the certificate, which makes it pretty pointless.

Re: Embedded insecurity

Altrux

My satnav (2023 VW group car, fully updated, Aug 2025 maps) still has points of interest that ceased to exist 30 years ago. There was an old petrol station towards the city centre that was redeveloped into apartments in the 90s, but it's still on the map. And a pharmacy that closed at least 12 years ago. Curious where they get their data from!

Ribfeast

Coming from an engineering company, the amount of paperwork and nightmare to change the "software part" for the baseline is a a huge body of work. Has to go past the test team etc too, months of work. Go through EULAs, ensure no clauses can catch us out. I can see why they don't like to change it after it's implemented.

Car's web browser?

Yet Another Anonymous coward

I'm still suspicious of the digital clock on my car

Just Say No

DoctorNine

I know this is tantamount to going full-frontal Luddite, but maybe simply stop putting tablets on my dashboard? Please? It's just foolish. Really.

Re: Just Say No

Anonymous Coward

Just take your tablets and relax, or we'll have the nice orderly will assist you.

Re: Just Say No

cyberdemon

I could not agree more.

I will never buy an "iPad on wheels". The tendency to omit the dashboard instrument cluster and physical controls for heating/etc and put it all on a giant touchscreen, I find obnoxious.

All the more so if it transpires that these controls and more could be hijacked via a vulnerable embedded web browser on the same screen.

Uh-oh -- WHY am I suddenly thinking of a VENERABLE religious leader
frolicking on a FORT LAUDERDALE weekend?