Security Flaws Found in Zero Motorcycles and Yadea Scooters
AI-generated from multiple sources. Verify before acting on this reporting.
WASHINGTON — Electric motorcycles manufactured by Zero Motorcycles and scooters produced by Yadea contain security vulnerabilities that could allow attackers to gain unauthorized access, modify firmware, or intercept commands to compromise vehicle safety and control.
Researchers at Bureau Veritas Cybersecurity and Ashen Chathuranga identified the flaws in the vehicles' firmware and authentication protocols. The findings were reported to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) on April 28, 2026. The vulnerabilities affect models sold in the United States and China.
The security gaps could enable malicious actors to take control of critical vehicle functions. Potential risks include unauthorized access to the vehicle's internal systems, modification of software that governs performance, and interception of commands sent to the vehicle. Such actions could directly impact rider safety and vehicle operation.
Zero Motorcycles and Yadea have not yet issued public statements regarding the specific nature of the vulnerabilities or the timeline for releasing patches. CISA has listed the affected vehicles in its advisory database, urging owners to check for software updates from the manufacturers.
The discovery highlights growing concerns about cybersecurity in the expanding electric vehicle market. As vehicles become more connected and rely heavily on software for operation, the potential for remote exploitation increases. Security experts note that physical access is often not required to exploit these types of firmware vulnerabilities.
Owners of the affected models are advised to monitor communications from their respective manufacturers for guidance on mitigating the risks. Until patches are available, experts recommend limiting the use of connected features that may expose the vehicle to external networks.
The situation remains developing as manufacturers work to address the identified issues. It is unclear how many vehicles are currently in circulation with the unpatched vulnerabilities or if any incidents of exploitation have occurred. CISA continues to monitor the situation and will provide updates as more information becomes available from the manufacturers and researchers.