<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://consumerrights.wiki/index.php?action=history&amp;feed=atom&amp;title=John_Deere_security_flaws_exposed_sensitive_customer_information</id>
	<title>John Deere security flaws exposed sensitive customer information - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://consumerrights.wiki/index.php?action=history&amp;feed=atom&amp;title=John_Deere_security_flaws_exposed_sensitive_customer_information"/>
	<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;action=history"/>
	<updated>2026-04-28T23:26:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=48719&amp;oldid=prev</id>
		<title>Marc84: /* References */ Update archive link (was bad snapshot).</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=48719&amp;oldid=prev"/>
		<updated>2026-04-01T00:46:27Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;References: &lt;/span&gt; Update archive link (was bad snapshot).&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 00:46, 1 April 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l18&quot;&gt;Line 18:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 18:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article |archive-url=http://web.archive.org/web/20250723050713/https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/ |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; The company also wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2 |archive-url=https://preservetube.com/watch?v=rB_SleNKBus |archive-date=23 Feb 2026}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;title&lt;/del&gt;=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming &lt;/del&gt;|archive-url=http://web.archive.org/web/&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;20250723043851&lt;/del&gt;/https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world |archive-date=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;23 Jul 2025&lt;/del&gt;}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt; Later in 2024, John Deere also partnered with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program |archive-url=http://web.archive.org/web/20250708172955/https://www.deere.com/en/our-company/digital-security/hackerone-program/ |archive-date=8 Jul 2025}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article |archive-url=http://web.archive.org/web/20250723050713/https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/ |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; The company also wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2 |archive-url=https://preservetube.com/watch?v=rB_SleNKBus |archive-date=23 Feb 2026}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|author=Bedord |first=Laurie |date=23 Apr 2021 |title=John Deere Addresses the Ongoing Risks of Living in a Digital World &lt;/ins&gt;|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world |&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;url-status&lt;/ins&gt;=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;live &lt;/ins&gt;|archive-url=http://web.archive.org/web/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;20210426083343&lt;/ins&gt;/https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world |archive-date=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;26 Apr 2021 |publisher=Successful Farming |language=en |format=article&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt; Later in 2024, John Deere also partnered with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program |archive-url=http://web.archive.org/web/20250708172955/https://www.deere.com/en/our-company/digital-security/hackerone-program/ |archive-date=8 Jul 2025}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-47905:rev-48719:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Marc84</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=47905&amp;oldid=prev</id>
		<title>Reform: Added a date at start of a paragraph to note it as history rather than ongoing</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=47905&amp;oldid=prev"/>
		<updated>2026-03-27T17:03:03Z</updated>

		<summary type="html">&lt;p&gt;Added a date at start of a paragraph to note it as history rather than ongoing&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:03, 27 March 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l10&quot;&gt;Line 10:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 10:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Description=John Deere allegedly lied about the severity of publicized vulnerabilities in their software.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Description=John Deere allegedly lied about the severity of publicized vulnerabilities in their software.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;A &lt;/del&gt;number of security flaws in the software [[John Deere|&#039;&#039;&#039;John Deere&#039;&#039;&#039;]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;In 2021, a &lt;/ins&gt;number of security flaws in the software [[John Deere|&#039;&#039;&#039;John Deere&#039;&#039;&#039;]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l18&quot;&gt;Line 18:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 18:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article |archive-url=http://web.archive.org/web/20250723050713/https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/ |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; The company also wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2 |archive-url=https://preservetube.com/watch?v=rB_SleNKBus |archive-date=23 Feb 2026}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming |archive-url=http://web.archive.org/web/20250723043851/https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article |archive-url=http://web.archive.org/web/20250723050713/https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/ |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; The company also wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2 |archive-url=https://preservetube.com/watch?v=rB_SleNKBus |archive-date=23 Feb 2026}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming |archive-url=http://web.archive.org/web/20250723043851/https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt; Later in 2024, John Deere also partnered with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program |archive-url=http://web.archive.org/web/20250708172955/https://www.deere.com/en/our-company/digital-security/hackerone-program/ |archive-date=8 Jul 2025}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Later in 2024, John Deere also partnered with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program |archive-url=http://web.archive.org/web/20250708172955/https://www.deere.com/en/our-company/digital-security/hackerone-program/ |archive-date=8 Jul 2025}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-43351:rev-47905:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Reform</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=43351&amp;oldid=prev</id>
		<title>IronRune: Style edit</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=43351&amp;oldid=prev"/>
		<updated>2026-03-14T18:05:25Z</updated>

		<summary type="html">&lt;p&gt;Style edit&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:05, 14 March 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l10&quot;&gt;Line 10:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 10:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Description=John Deere allegedly lied about the severity of publicized vulnerabilities in their software.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Description=John Deere allegedly lied about the severity of publicized vulnerabilities in their software.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere|&#039;&#039;&#039;John Deere&#039;&#039;&#039;]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;up &lt;/del&gt;with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere|&#039;&#039;&#039;John Deere&#039;&#039;&#039;]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere&#039;s software.&amp;lt;ref name=&quot;:0&quot;&amp;gt;{{Cite web|url=https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/|publisher=Vice Media|title=Bugs Allowed Hackers to Dox John Deere Tractor Owners|author=Lorenzo Franceschi-Bicchierai|date=22 April 2021|language=en|format=article |archive-url=http://web.archive.org/web/20251219042942/https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/ |archive-date=19 Dec 2025}}&amp;lt;/ref&amp;gt; Although &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;John Deere &lt;/del&gt;confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &quot;access to customer accounts, dealer accounts, or sensitive personal information.&quot;&amp;lt;ref name=&quot;:0&quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere&#039;s software.&amp;lt;ref name=&quot;:0&quot;&amp;gt;{{Cite web|url=https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/|publisher=Vice Media|title=Bugs Allowed Hackers to Dox John Deere Tractor Owners|author=Lorenzo Franceschi-Bicchierai|date=22 April 2021|language=en|format=article |archive-url=http://web.archive.org/web/20251219042942/https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/ |archive-date=19 Dec 2025}}&amp;lt;/ref&amp;gt; Although &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;the company &lt;/ins&gt;confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &quot;access to customer accounts, dealer accounts, or sensitive personal information.&quot;&amp;lt;ref name=&quot;:0&quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;the way &lt;/del&gt;John Deere handled the reporting of security flaws. The researcher claimed &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;it was researched with &lt;/del&gt;a developer account&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;, &lt;/del&gt;and the &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;current &lt;/del&gt;terms and conditions&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-url=https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-date=24 Apr 2021|url-status=dead|title=Global Security Request form with terms on personal data and privacy|publisher=John Deere|language=en}}&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;, among other issues like the previously mentioned downplaying of the impact&lt;/del&gt;.&amp;lt;ref name=&quot;:1&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=22 Apr 2021 |title=John Deere security flaw exposed address of every customer &amp;amp; more! |url=https://www.youtube.com/watch?v=hqablgjQ02g |publisher=YouTube |language=en |format=video |ref=Rossmann-video-1 |archive-url=https://preservetube.com/watch?v=hqablgjQ02g |archive-date=23 Feb 2026}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;how &lt;/ins&gt;John Deere handled the reporting of security flaws. The researcher claimed &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;the flaws were found using &lt;/ins&gt;a developer account and the terms and conditions&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-url=https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-date=24 Apr 2021|url-status=dead|title=Global Security Request form with terms on personal data and privacy|publisher=John Deere|language=en}}&amp;lt;/ref&amp;gt; for disclosing &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;vulnerabilities &lt;/ins&gt;were followed, but were removed after the incident.&amp;lt;ref name=&quot;:1&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=22 Apr 2021 |title=John Deere security flaw exposed address of every customer &amp;amp; more! |url=https://www.youtube.com/watch?v=hqablgjQ02g |publisher=YouTube |language=en |format=video |ref=Rossmann-video-1 |archive-url=https://preservetube.com/watch?v=hqablgjQ02g |archive-date=23 Feb 2026}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article |archive-url=http://web.archive.org/web/20250723050713/https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/ |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Also, soon after the incident, John Deere &lt;/del&gt;wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2 |archive-url=https://preservetube.com/watch?v=rB_SleNKBus |archive-date=23 Feb 2026}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming |archive-url=http://web.archive.org/web/20250723043851/https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article |archive-url=http://web.archive.org/web/20250723050713/https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/ |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;The company also &lt;/ins&gt;wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2 |archive-url=https://preservetube.com/watch?v=rB_SleNKBus |archive-date=23 Feb 2026}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming |archive-url=http://web.archive.org/web/20250723043851/https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world |archive-date=23 Jul 2025}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Quite a bit later &lt;/del&gt;in 2024, John Deere &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;has &lt;/del&gt;also partnered &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;up &lt;/del&gt;with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program |archive-url=http://web.archive.org/web/20250708172955/https://www.deere.com/en/our-company/digital-security/hackerone-program/ |archive-date=8 Jul 2025}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Later &lt;/ins&gt;in 2024, John Deere also partnered with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program |archive-url=http://web.archive.org/web/20250708172955/https://www.deere.com/en/our-company/digital-security/hackerone-program/ |archive-date=8 Jul 2025}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-38714:rev-43351:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>IronRune</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=38714&amp;oldid=prev</id>
		<title>Bananabot: Added archive URLs for 6 citation(s) using CRWCitationBot</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=38714&amp;oldid=prev"/>
		<updated>2026-02-23T05:37:35Z</updated>

		<summary type="html">&lt;p&gt;Added archive URLs for 6 citation(s) using CRWCitationBot&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 05:37, 23 February 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l13&quot;&gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere&#039;s software.&amp;lt;ref name=&quot;:0&quot;&amp;gt;{{Cite web|url=https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/|publisher=Vice Media|title=Bugs Allowed Hackers to Dox John Deere Tractor Owners|author=Lorenzo Franceschi-Bicchierai|date=22 April 2021|language=en|format=article}}&amp;lt;/ref&amp;gt; Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &quot;access to customer accounts, dealer accounts, or sensitive personal information.&quot;&amp;lt;ref name=&quot;:0&quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere&#039;s software.&amp;lt;ref name=&quot;:0&quot;&amp;gt;{{Cite web|url=https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/|publisher=Vice Media|title=Bugs Allowed Hackers to Dox John Deere Tractor Owners|author=Lorenzo Franceschi-Bicchierai|date=22 April 2021|language=en|format=article &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|archive-url=http://web.archive.org/web/20251219042942/https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/ |archive-date=19 Dec 2025&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &quot;access to customer accounts, dealer accounts, or sensitive personal information.&quot;&amp;lt;ref name=&quot;:0&quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-url=https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-date=24 Apr 2021|url-status=dead|title=Global Security Request form with terms on personal data and privacy|publisher=John Deere|language=en}}&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.&amp;lt;ref name=&quot;:1&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=22 Apr 2021 |title=John Deere security flaw exposed address of every customer &amp;amp; more! |url=https://www.youtube.com/watch?v=hqablgjQ02g |publisher=YouTube |language=en |format=video |ref=Rossmann-video-1}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-url=https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-date=24 Apr 2021|url-status=dead|title=Global Security Request form with terms on personal data and privacy|publisher=John Deere|language=en}}&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.&amp;lt;ref name=&quot;:1&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=22 Apr 2021 |title=John Deere security flaw exposed address of every customer &amp;amp; more! |url=https://www.youtube.com/watch?v=hqablgjQ02g |publisher=YouTube |language=en |format=video |ref=Rossmann-video-1 &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|archive-url=https://preservetube.com/watch?v=hqablgjQ02g |archive-date=23 Feb 2026&lt;/ins&gt;}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article}}&amp;lt;/ref&amp;gt; Also, soon after the incident, John Deere wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|archive-url=http://web.archive.org/web/20250723050713/https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/ |archive-date=23 Jul 2025&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; Also, soon after the incident, John Deere wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web |author=Louis Rossmann |date=25 Apr 2021 |title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video |ref=Rossmann-video-2 &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|archive-url=https://preservetube.com/watch?v=rB_SleNKBus |archive-date=23 Feb 2026&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|archive-url=http://web.archive.org/web/20250723043851/https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world |archive-date=23 Jul 2025&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Quite a bit later in 2024, John Deere has also partnered up with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Quite a bit later in 2024, John Deere has also partnered up with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|archive-url=http://web.archive.org/web/20250708172955/https://www.deere.com/en/our-company/digital-security/hackerone-program/ |archive-date=8 Jul 2025&lt;/ins&gt;}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-33350:rev-38714:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Bananabot</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=33350&amp;oldid=prev</id>
		<title>Bythmusters: Added cargo template</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=33350&amp;oldid=prev"/>
		<updated>2026-01-13T11:42:29Z</updated>

		<summary type="html">&lt;p&gt;Added cargo template&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 11:42, 13 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{IncidentCargo&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|Company=John Deere&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|StartDate=2021-4-22&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|EndDate=&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|Status=Resolved&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|ProductLine=&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|Product=&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|ArticleType=Product&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|Type=Privacy, Security&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|Description=John Deere allegedly lied about the severity of publicized vulnerabilities in their software.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere|&amp;#039;&amp;#039;&amp;#039;John Deere&amp;#039;&amp;#039;&amp;#039;]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner up with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere|&amp;#039;&amp;#039;&amp;#039;John Deere&amp;#039;&amp;#039;&amp;#039;]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner up with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-12321:rev-33350:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Bythmusters</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=12321&amp;oldid=prev</id>
		<title>Emanuele at 20:15, 30 March 2025</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=12321&amp;oldid=prev"/>
		<updated>2025-03-30T20:15:34Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:15, 30 March 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner up with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|&#039;&#039;&#039;John Deere&#039;&#039;&#039;&lt;/ins&gt;]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner up with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-11946:rev-12321:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Emanuele</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=11946&amp;oldid=prev</id>
		<title>Kostas: add ids to deduplicate refs</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=11946&amp;oldid=prev"/>
		<updated>2025-03-18T08:10:24Z</updated>

		<summary type="html">&lt;p&gt;add ids to deduplicate refs&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 08:10, 18 March 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l4&quot;&gt;Line 4:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 4:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere&amp;#039;s software.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web|url=https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/|publisher=Vice Media|title=Bugs Allowed Hackers to Dox John Deere Tractor Owners|author=Lorenzo Franceschi-Bicchierai|date=22 April 2021|language=en|format=article}}&amp;lt;/ref&amp;gt; Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &amp;quot;access to customer accounts, dealer accounts, or sensitive personal information.&amp;quot;&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere&amp;#039;s software.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web|url=https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/|publisher=Vice Media|title=Bugs Allowed Hackers to Dox John Deere Tractor Owners|author=Lorenzo Franceschi-Bicchierai|date=22 April 2021|language=en|format=article}}&amp;lt;/ref&amp;gt; Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &amp;quot;access to customer accounts, dealer accounts, or sensitive personal information.&amp;quot;&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-url=https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-date=24 Apr 2021|url-status=dead|title=Global Security Request form with terms on personal data and privacy|publisher=John Deere|language=en}}&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.&amp;lt;ref name=&quot;:1&quot;&amp;gt;{{Cite web|title=John Deere security flaw exposed address of every customer &amp;amp; more!|url=https://www.youtube.com/watch?v=hqablgjQ02g|publisher=YouTube|&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;author&lt;/del&gt;=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Louis Rossmann|date=22 Apr 2021&lt;/del&gt;|format=video|&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;language&lt;/del&gt;=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;en&lt;/del&gt;}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-url=https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-date=24 Apr 2021|url-status=dead|title=Global Security Request form with terms on personal data and privacy|publisher=John Deere|language=en}}&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.&amp;lt;ref name=&quot;:1&quot;&amp;gt;{{Cite web &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|author=Louis Rossmann |date=22 Apr 2021 &lt;/ins&gt;|title=John Deere security flaw exposed address of every customer &amp;amp; more! |url=https://www.youtube.com/watch?v=hqablgjQ02g |publisher=YouTube |&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;language&lt;/ins&gt;=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;en &lt;/ins&gt;|format=video |&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;ref&lt;/ins&gt;=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Rossmann-video-1&lt;/ins&gt;}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&amp;#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article}}&amp;lt;/ref&amp;gt; Also, soon after the incident, John Deere wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web|title=John Deere instigates hackers, gets hacked again|url=https://www.youtube.com/watch?v=rB_SleNKBus&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|date=25 Apr 2021&lt;/del&gt;|publisher=YouTube&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|author=Louis Rossmann&lt;/del&gt;|language=en|format=video}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article}}&amp;lt;/ref&amp;gt; Also, soon after the incident, John Deere wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;{{Cite web &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|author=Louis Rossmann |date=25 Apr 2021 &lt;/ins&gt;|title=John Deere instigates hackers, gets hacked again |url=https://www.youtube.com/watch?v=rB_SleNKBus |publisher=YouTube |language=en |format=video &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|ref=Rossmann-video-2&lt;/ins&gt;}}&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;{{Cite web|url=https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming}}&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Quite a bit later in 2024, John Deere has also partnered up with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Quite a bit later in 2024, John Deere has also partnered up with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.deere.com/en/our-company/digital-security/hackerone-program/|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-9926:rev-11946:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Kostas</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=9926&amp;oldid=prev</id>
		<title>InTransparencyWeTrust: improve references with additional information</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=9926&amp;oldid=prev"/>
		<updated>2025-02-25T14:16:25Z</updated>

		<summary type="html">&lt;p&gt;improve references with additional information&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 14:16, 25 February 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner up with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment. John Deere downplayed the impact while simultaneously increasing their security practices, as security jobs opened and they started to partner up with security researchers.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Security flaws and the reporting process ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Security flaws and the reporting process==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere&#039;s software.&amp;lt;ref name=&quot;:0&quot;&amp;gt;https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/&amp;lt;/ref&amp;gt; Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &quot;access to customer accounts, dealer accounts, or sensitive personal information.&quot;&amp;lt;ref name=&quot;:0&quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A security researcher with the alias Sick Codes found severe vulnerabilities in John Deere&#039;s software.&amp;lt;ref name=&quot;:0&quot;&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Cite web|url=&lt;/ins&gt;https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|publisher=Vice Media|title=Bugs Allowed Hackers to Dox John Deere Tractor Owners|author=Lorenzo Franceschi-Bicchierai|date=22 April 2021|language=en|format=article}}&lt;/ins&gt;&amp;lt;/ref&amp;gt; Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &quot;access to customer accounts, dealer accounts, or sensitive personal information.&quot;&amp;lt;ref name=&quot;:0&quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions&amp;lt;ref&amp;gt;https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.&amp;lt;ref name=&quot;:1&quot;&amp;gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Louis Rossmann - Video Directory]]: [&lt;/del&gt;https://www.youtube.com/watch?v=hqablgjQ02g &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;John Deere security flaw exposed address of every customer &amp;amp; more!]&lt;/del&gt;&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions&amp;lt;ref&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Cite web|url=https://www.deere.com/en/forms/corporate/it-security-consulting/|archive-url=&lt;/ins&gt;https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|archive-date=24 Apr 2021|url-status=dead|title=Global Security Request form with terms on personal data and privacy|publisher=John Deere|language=en}}&lt;/ins&gt;&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.&amp;lt;ref name=&quot;:1&quot;&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Cite web|title=John Deere security flaw exposed address of every customer &amp;amp; more!|url=&lt;/ins&gt;https://www.youtube.com/watch?v=hqablgjQ02g&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|publisher=YouTube|author=Louis Rossmann|date=22 Apr 2021|format=video|language=en}}&lt;/ins&gt;&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== John Deere&#039;s response ===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===John Deere&#039;s response===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/&amp;lt;/ref&amp;gt; Also, soon after the incident, John Deere wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Louis Rossmann - Video Directory]]: [&lt;/del&gt;https://www.youtube.com/watch?v=rB_SleNKBus &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;John Deere instigates hackers, gets hacked again]&lt;/del&gt;&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Cite web|url=&lt;/ins&gt;https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|publisher=Forbes|title=184 Years In: Ag Giant John Deere Awaits Its First Software Vulnerability|author=Paul F. Roberts|date=14 Apr 2021|format=article}}&lt;/ins&gt;&amp;lt;/ref&amp;gt; Also, soon after the incident, John Deere wrote, &quot;This week&#039;s forecast: one to three inches of nonsense&quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&quot;:2&quot;&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Cite web|title=John Deere instigates hackers, gets hacked again|url=&lt;/ins&gt;https://www.youtube.com/watch?v=rB_SleNKBus&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|date=25 Apr 2021|publisher=YouTube|author=Louis Rossmann|language=en|format=video}}&lt;/ins&gt;&amp;lt;/ref&amp;gt; John Deere addressed it by stating &quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&quot;&amp;lt;ref&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Cite web|url=&lt;/ins&gt;https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|title=John Deere Addresses the Ongoing Risks of Living in a Digital World|author=Laurie Bedord|date=23 Apr 2021|language=en|format=article|publisher=Successful Farming}}&lt;/ins&gt;&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&amp;lt;ref name=&quot;:1&quot; /&amp;gt;&amp;lt;ref name=&quot;:2&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Quite a bit later in 2024, John Deere has also partnered up with HackerOne&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;ref&amp;gt;https://www.hackerone.com/&amp;lt;/ref&amp;gt; &lt;/del&gt;to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;https://www.deere.com/en/our-company/digital-security/hackerone-program/&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Quite a bit later in 2024, John Deere has also partnered up with HackerOne to enhance collaborative relationships with security researchers.&amp;lt;ref&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Cite web|url=&lt;/ins&gt;https://www.deere.com/en/our-company/digital-security/hackerone-program/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;|format=press release|publisher=John Deere|title=Deere Bolsters Information Security With HackerOne Program}}&lt;/ins&gt;&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-9925:rev-9926:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>InTransparencyWeTrust</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=9925&amp;oldid=prev</id>
		<title>InTransparencyWeTrust: Create the introduction and section the rest of the article content</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=9925&amp;oldid=prev"/>
		<updated>2025-02-25T14:01:03Z</updated>

		<summary type="html">&lt;p&gt;Create the introduction and section the rest of the article content&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 14:01, 25 February 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment, &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;according &lt;/del&gt;to security researcher Sick Codes&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;, who &lt;/del&gt;found &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;the &lt;/del&gt;vulnerabilities.&amp;lt;ref name=&quot;:0&quot;&amp;gt;https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/&amp;lt;/ref&amp;gt; Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &quot;access to customer accounts, dealer accounts, or sensitive personal information.&quot;&amp;lt;ref name=&quot;:0&quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A number of security flaws in the software [[John Deere]] provided could have allowed hackers to find and download the personal data of all owners of the company’s farming vehicles and equipment&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. John Deere downplayed the impact while simultaneously increasing their security practices&lt;/ins&gt;, &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;as security jobs opened and they started &lt;/ins&gt;to &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;partner up with security researchers.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;== Security flaws and the reporting process ==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;A &lt;/ins&gt;security researcher &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;with the alias &lt;/ins&gt;Sick Codes found &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;severe &lt;/ins&gt;vulnerabilities &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;in John Deere&#039;s software&lt;/ins&gt;.&amp;lt;ref name=&quot;:0&quot;&amp;gt;https://www.vice.com/en/article/bugs-allowed-hackers-to-dox-all-john-deere-owners/&amp;lt;/ref&amp;gt; Although John Deere confirmed the existence of the vulnerabilities, they downplayed their impact by stating it was remediated and it did not give &quot;access to customer accounts, dealer accounts, or sensitive personal information.&quot;&amp;lt;ref name=&quot;:0&quot; /&amp;gt; This was not true according to the security researcher, because on newer farm equipment, the vehicle or equipment owner’s name, their physical address, the equipment’s unique ID, and its Vehicle Identification Number can be seen.&amp;lt;ref name=&quot;:0&quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions&amp;lt;ref&amp;gt;https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.&amp;lt;ref name=&amp;quot;:1&amp;quot;&amp;gt;[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=hqablgjQ02g John Deere security flaw exposed address of every customer &amp;amp; more!]&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Besides the security flaws, another major part of the controversy was about the way John Deere handled the reporting of security flaws. The researcher claimed it was researched with a developer account, and the current terms and conditions&amp;lt;ref&amp;gt;https://web.archive.org/web/20210424021348/https://www.deere.com/en/forms/corporate/it-security-consulting/&amp;lt;/ref&amp;gt; for disclosing were followed, but were removed after the incident, among other issues like the previously mentioned downplaying of the impact.&amp;lt;ref name=&amp;quot;:1&amp;quot;&amp;gt;[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=hqablgjQ02g John Deere security flaw exposed address of every customer &amp;amp; more!]&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;=== John Deere&#039;s response ===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/&amp;lt;/ref&amp;gt; Also, soon after the incident, John Deere wrote, &amp;quot;This week&amp;#039;s forecast: one to three inches of nonsense&amp;quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&amp;quot;:2&amp;quot;&amp;gt;[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=rB_SleNKBus John Deere instigates hackers, gets hacked again]&amp;lt;/ref&amp;gt; John Deere addressed it by stating &amp;quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&amp;#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&amp;quot;&amp;lt;ref&amp;gt;https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the immediate aftermath of the incident, John Deere posted a spate of job openings for embedded cyber security engineers to “drive embedded software cybersecurity requirements and security features development” as well as “develop threat models using industry best practices.&amp;lt;ref&amp;gt;https://www.forbes.com/sites/paulfroberts/2021/04/14/184-years-in-ag-giant-john-deere-awaits-its-first-software-vulnerability/&amp;lt;/ref&amp;gt; Also, soon after the incident, John Deere wrote, &amp;quot;This week&amp;#039;s forecast: one to three inches of nonsense&amp;quot;, which can be interpreted as denying that the recent security flaws were severe.&amp;lt;ref name=&amp;quot;:2&amp;quot;&amp;gt;[[Louis Rossmann - Video Directory]]: [https://www.youtube.com/watch?v=rB_SleNKBus John Deere instigates hackers, gets hacked again]&amp;lt;/ref&amp;gt; John Deere addressed it by stating &amp;quot;We investigated immediately, and the misconfigurations were fixed right away. The important take away here is that our customers&amp;#039; sensitive personal or business information, including financial and agronomic data, was never accessed, which is a point that didn’t come through in the article.&amp;quot;&amp;lt;ref&amp;gt;https://www.agriculture.com/news/technology/john-deere-addresses-the-risks-of-living-in-a-digital-world&amp;lt;/ref&amp;gt; However, their claims seem to be not true, because the researcher claims they could access the data.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-9585:rev-9925:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>InTransparencyWeTrust</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=9585&amp;oldid=prev</id>
		<title>InTransparencyWeTrust: remove unneeded category</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=John_Deere_security_flaws_exposed_sensitive_customer_information&amp;diff=9585&amp;oldid=prev"/>
		<updated>2025-02-22T15:10:20Z</updated>

		<summary type="html">&lt;p&gt;remove unneeded category&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:10, 22 February 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l11&quot;&gt;Line 11:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 11:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:John Deere]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:John Deere]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Incidents]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Incidents]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:Louis Rossmann]]&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Articles based on videos]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Articles based on videos]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-9441:rev-9585:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>InTransparencyWeTrust</name></author>
	</entry>
</feed>