logo elektroda
logo elektroda
X
logo elektroda

Delphi EL3 BSI: PIN Extraction, EEPROM, Cloning & Common Faults in PSA Peugeot Citroën DS Opel

User question

Bsi Delphi el3

Artificial Intelligence Response

Direct answer to the question

  • “BSI Delphi EL3” (also labeled EL3 CEM00/CEM0x) is the third-generation Delphi/Aptiv Body Systems Interface used in most PSA-Stellantis vehicles from ≈ 2016-today (Peugeot 308 T9/T41, 3008 P84, 5008 P87, Citroën C3 III, Jumpy K0, DS7, Opel Combo/Vivaro, etc.).
  • It is the central body controller and network gateway. It stores the immobiliser PIN & key data, VIN, mileage, all tele-coding, and drives almost every body load (lighting, locks, wipers, windows, HVAC, etc.).
  • Unlike earlier JCI/Siemens BSIs, EL3 uses an encrypted 128 kbit SPI EEPROM (ST M95128 or 95256) plus a 32-bit MCU (NXP SPC56xx) with secure boot/CRC.
  • PIN extraction over OBD is rarely possible on current firmware; in “all-keys-lost” cases the EEPROM must be read on the bench or in circuit.
  • There is no universal “virgin file”; cloning or virginisation must respect each unit’s HW/SW version and checksum areas.

Key points
• Network: 2×HS-CAN, 1×LS-CAN, several LIN, K-Line (legacy).
• Supply: 12 V, sleep current < 25 mA; wake via CAN or 30 IGN line.
• Bench pins (typical D6 revision): +12 V = Pin 8, GND = 10, CAN-H = 6, CAN-L = 8 on the 16-way black header; IGN simulation by shorting blue-connector pins 32-33.
• Tools: PSA Diagbox/Lexia for coding; IM608/VVDI2/FVDI/SMOK/CarProg/UPA/Xprog for EEPROM.
• Always back-up original dump, use a stabilised 13.0-13.8 V supply, and respect legal/anti-theft regulations.

Detailed problem analysis

  1. Hardware / architecture
    • MCU: NXP SPC56AP54 (Power-Architecture e200z4, 120 MHz, ECC-flash) with secure boot.
    • External memory: ST M95128 (128 kbit) or M95256 (256 kbit) SPI EEPROM; stores PIN, key list, tele-coding mirror, mileage counter.
    • Transceivers: NXP TJA1042 HS-CAN, TJA1020 LIN, Melexis TLE series high-side switches.
    • Power module: multiple low-RDS(on) MOSFETs plus 5 V/3.3 V DC/DC (TPS6538x family).
    • Relays: electromechanical for wipers, heated rear screen, etc.

  2. Functional domains
    a. Gateway: routes UDS/KWP diagnostics between HS-CAN-1 (power-train) and LS-CAN-2 (body).
    b. Security: immobiliser authentication with engine ECU via challenge-response (ISO 14229 extended-security).
    c. Load control: PWM dimming for DRL/stop lamps, low-side drivers for indicators, high-side for door-lock actuators.
    d. Power-mode management: three sleep levels (Stop0 ≈ 7 mA, Stop1 ≈ 17 mA, Stop2 ≈ 25 mA).
    e. Data logger: event counters, low-voltage history, DTC storage.

  3. Why PIN extraction is difficult
    • From 2018-MY the four-digit PIN is AES-128 encrypted and delivered only after a seed-key exchange tied to the vehicle’s asymmetric secret stored in the MCU’s HSM (Hardware Security Module).
    • Budget tools therefore fail unless an authorised key is already present (they reuse its rolling-code session).
    • Reading the raw SPI EEPROM bypasses this because the clear PIN is still mirrored there (two copies, byte-swapped).

  4. EEPROM reading / virginisation workflow
    Step 1: bench-power BSI (see pinout below) or remove EEPROM.
    Step 2: read full 16/32 kB dump with VVDI-Prog, TL866II-Plus, UPA-USB, or Xprog.
    Step 3: save at least two backups.
    Step 4: for PIN: search offsets 0x430–0x437 and 0x4F0–0x4F7, ASCII-hex reversed (e.g. “21 43” → PIN = 3412).
    Step 5: for virginisation:
    • clear VIN (offset 0x120–0x12F), clear key slots (0x260–0x29F), leave CRC areas intact, OR
    • use forum-shared script matching exact SW ref (e.g. CEM00-D6-SW9651675080).
    Step 6: write back, refit, personalise with Diagbox: VIN ➜ tele-code ➜ key-learning ➜ ECU pairing.

  5. Common failures
    • Low-battery flashing while updating → corrupt flash, non-start, no-comms; needs JTAG re-flash or clone.
    • Water ingress near cabin-fuse area → corroded MOSFETs ➜ permanent lights or wiper.
    • Relay fatigue (≥ 100 k cycles) → rear demister or main beam inoperative.
    • LIN bus short → loss of mirror/heater control, sets B1003 fault “LIN bus short to GND”.

  6. Pinout (most EL3‐D6 / D7 variants)

60-way BLUE plug:
32 IGN sense 33 IGN feedback (bridge 32-33 to simulate ON)
40 CAN-L (LS) 41 CAN-H (LS)
...
16-way BLACK header (bench favourite):
6 CAN-H (HS2) 8 CAN-L (HS2)
8 +12 V BATT 10 GND

Consult specific wiring diagrams; PSA sometimes swaps HS/LS nets between revisions.

Current information and trends

• 2022-24 firmware revisions added Secure-CAN (ID-whitelisting + message MAC) between EL3 and Power-train ECUs, complicating cloning.
• Aptiv now supplies EL4 (MPC5777 MCU + encrypted QSPI flash) for the new STLA Small/Medium platforms – no public tool supports it yet.
• “Bench-mode” adapters (SMOK J-TAG2, Abrites ABRITES-PSA bench cable) allow UDS access out of the car; these require keeping the BCM awake with a 125 kbps keep-alive frame every 2 s.
• Market shift toward cloud-based tele-coding (Diagbox 9.9 + token) means local VIN/PIN injections will be phased out.

Supporting explanations and details

Analogy: Think of the BSI as the vehicle’s “motherboard + BIOS + TPM”. The MCU is the CPU, the EEPROM is the CMOS/NVRAM, and the immobiliser keys are stored like UEFI-TPM secrets. Any mismatch (e.g., wrong VIN) trips secure-boot and the engine ECU refuses start – similar to a PC that won’t boot after a corrupted BIOS checksum.

Example checksum pitfall: after editing the 0x260-0x29F key area you must update the 16-bit CRC at 0x2A0-0x2A1; otherwise the BSI enters “recovery” (continuous relay clicking, no bus activity).

Ethical and legal aspects

• Immobiliser circumvention is regulated; in the EU it falls under Directive 2013/98/EU (anti-theft approval). Performing virginisation or key-addition on a vehicle that you do not own or without documented customer consent is illegal.
• Data protection (VIN, mileage) is personal data; GDPR requires secure handling and deletion of dumps after job completion.
• Many insurers void coverage if unauthorised ECU/BCM modifications are detected after theft or accident.
• Always inform customers that mileage or service data may be reset during BSI replacement and must be restored to avoid odometer fraud.

Practical guidelines

  1. Preparation
    – Stable 30 A lab PSU set to 13.5 V; battery buffer recommended.
    – Anti-ESD strap, hot-air rework station with 280 °C max for EEPROM removal.
    – Odissey or Lexia wiring diagram for exact variant (label e.g. 9830790580 D6-SW9651675080-HW9830406880).

  2. Safe bench setup
    – First power only +12 V & GND; verify sleep current (< 25 mA).
    – Bridge IGN pins ➜ current rises to 180–220 mA; CAN frames appear (check with PCAN-USB).
    – Keep CAN termination 60 Ω (two 120 Ω resistors).

  3. EEPROM handling
    – Clip reading: use Pomona SOIC-8 with LF shield; if ID read-fails > 3×, desolder.
    – After write verify, compare MD5 hash with original except intended edits.

  4. Post-installation
    – Carry out full tele-coding via Diagbox: choose “download config from server” if internet available; if not, re-enter options manually (fog lights, rear sensors, tyre-pressure type…).
    – Program all keys in one session; keys left out will be invalidated.
    – Clear B1601/B1780 faults and perform voltage quality test.

Possible disclaimers or additional notes

• Information provided is for educational purposes; follow local legislation and OEM guidelines.
• Pinouts may vary; always verify against the physical label and wiring-diagram VIN range.
• New PSA firmware releases can block current aftermarket tools at any time – success cannot be guaranteed.

Suggestions for further research

• Investigate SPC56xx/NXP HSM attack surfaces (side-channel, glitching) for academic security analysis.
• Evaluate CAN-FD migration in upcoming EL4/EL5 platforms and its impact on aftermarket diagnostics.
• Develop open-source checksum calculators for EL3 EEPROM to reduce dependence on forum dumps.
• Study ISO 21434 cybersecurity compliance for BCM/BSI replacement workflows.

Brief summary

The Delphi EL3 BSI is the nerve-centre of recent PSA/Stellantis cars, combining a secure MCU, encrypted EEPROM and extensive load-control hardware. Modern firmware virtually blocks OBD PIN reading; reliable service work therefore requires bench access to the 95128/95256 EEPROM, careful checksum handling, and subsequent tele-coding with dealer-level tools. Cloning or virginising without respecting security structures will brick the unit. All activities must respect anti-theft, safety and data-protection laws.

Ask additional question

Wait...(2min)
Disclaimer: The responses provided by artificial intelligence (language model) may be inaccurate and misleading. Elektroda is not responsible for the accuracy, reliability, or completeness of the presented information. All responses should be verified by the user.