The Army has beefed up the firepower of some of its Stryker fleet in Europe, with 30mm cannons on some and others with remote-firing Javelin missiles, making it better ready to take on light armored and armored threats. But adversaries are finding other ways to attack the platform — with cyber.

The annual report from the Director of Operational Test and Evaluation for the Defense Department provides a detailed overview of Army, Navy and Air Force programs. The Army section contains two dozen systems with reviews and recommendations.

Two of those reports look at the Stryker-Dragoon and the Stryker CROWS-J, or Common Remotely Operated Weapons Station – Javelin and notes that both have “cybersecurity vulnerabilities that can be exploited.”

The vulnerabilities highlighted in the report were not simply revealed in testing.
While little detail is shared as to what vulnerabilities were exposed, which adversary exposed them or when this occurred, the shared language for the two systems and another comment point to something common in the hardware, not the new weaponry, on the Stryker.
https://www.armytimes.com/news/your-...nned-vehicles/