There's less attack surface on these systems than your typical windows install. The only reason I was able to hack the Macan is because they'd left a debug avenue open such that you could plug an ethernet adapter into one of the USB ports and use it drop a shell, and then exploit a bug with handling of a certificates to get privileged access. I was more surprised they'd left that USB ethernet avenue open than that there was a certificate handling bug.
I believe since I did it, somebody found another way in by inserting a malicious payload into a USB firmware update image.