
CVE-2022-37709
https://notcve.org/view.php?id=CVE-2022-37709
16 Sep 2022 — Tesla Model 3 V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app v4.23 is vulnerable to Authentication Bypass by spoofing. Tesla Model 3's Phone Key authentication is vulnerable to Man-in-the-middle attacks in the BLE channel. It allows attackers to open a door and drive the car away by leveraging access to a legitimate Phone Key. Tesla Model 3 versión V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app versión v4.23 es vulnerable a una Omisión de Autenticación por suplantación. La autenticación de la clave telefó... • https://fmsh-seclab.github.io • CWE-290: Authentication Bypass by Spoofing •

CVE-2022-3093 – Tesla ice_updater Time-Of-Check Time-Of-Use Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-3093
08 Sep 2022 — This vulnerability allows physical attackers to execute arbitrary code on affected Tesla vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ice_updater update mechanism. The issue results from the lack of proper validation of user-supplied firmware. An attacker can leverage this vulnerability to execute code in the context of root. • https://www.zerodayinitiative.com/advisories/ZDI-22-1188 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-27948
https://notcve.org/view.php?id=CVE-2022-27948
27 Mar 2022 — Certain Tesla vehicles through 2022-03-26 allow attackers to open the charging port via a 315 MHz RF signal containing a fixed sequence of approximately one hundred symbols. NOTE: the vendor's perspective is that the behavior is as intended Determinados vehículos Tesla versiones hasta 26-03-2022, permiten a atacantes abrir el puerto de carga por medio de una señal de RF de 315 MHz que contiene una secuencia fija de aproximadamente cien símbolos • https://github.com/pompel123/Tesla-Charging-Port-Opener • CWE-862: Missing Authorization •

CVE-2020-9306
https://notcve.org/view.php?id=CVE-2020-9306
17 Feb 2021 — Tesla SolarCity Solar Monitoring Gateway through 5.46.43 has a "Use of Hard-coded Credentials" issue because Digi ConnectPort X2e uses a .pyc file to store the cleartext password for the python user account. Tesla SolarCity Solar Monitoring Gateway versiones hasta 5.46.43, presenta un problema de "Use of Hard-coded Credentials" porque Digi ConnectPort X2e usa un archivo .pyc para almacenar la contraseña en texto sin cifrar para la cuenta de usuario de python • https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2020-0019/FEYE-2020-0019.md • CWE-522: Insufficiently Protected Credentials CWE-798: Use of Hard-coded Credentials •

CVE-2020-29438
https://notcve.org/view.php?id=CVE-2020-29438
30 Nov 2020 — Tesla Model X vehicles before 2020-11-23 have key fobs that accept firmware updates without signature verification. This allows attackers to construct firmware that retrieves an unlock code from a secure enclave chip. Los vehículos Tesla Model X anterior al 23-11-2020 tienen llaveros que aceptan actualizaciones de firmware sin verificación de firma. Esto permite a atacantes construir firmware que recupere un código de desbloqueo de un chip de enclave seguro • https://www.wired.com/story/tesla-model-x-hack-bluetooth • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2020-29439
https://notcve.org/view.php?id=CVE-2020-29439
30 Nov 2020 — Tesla Model X vehicles before 2020-11-23 have key fobs that rely on five VIN digits for the authentication needed for a body control module (BCM) to initiate a Bluetooth wake-up action. (The full VIN is visible from outside the vehicle.) Los vehículos Tesla Model X anterior al 23-11-2020 tienen llaveros que dependen de cinco dígitos VIN para la autenticación necesaria para que un módulo de control de carrocería (BCM) inicie una acción de activación de Bluetooth. (El VIN completo es visible desde el exterior... • https://www.wired.com/story/tesla-model-x-hack-bluetooth •

CVE-2020-29440
https://notcve.org/view.php?id=CVE-2020-29440
30 Nov 2020 — Tesla Model X vehicles before 2020-11-23 do not perform certificate validation during an attempt to pair a new key fob with the body control module (BCM). This allows an attacker (who is inside a vehicle, or is otherwise able to send data over the CAN bus) to start and drive the vehicle with a spoofed key fob. Los vehículos Tesla Model X anterior al 23-11-2020 no realizan la comprobación del certificado durante un intento de emparejar un nuevo llavero con el módulo de control de carrocería (BCM). Esto permi... • https://www.wired.com/story/tesla-model-x-hack-bluetooth • CWE-295: Improper Certificate Validation •

CVE-2020-15912
https://notcve.org/view.php?id=CVE-2020-15912
23 Jul 2020 — Tesla Model 3 vehicles allow attackers to open a door by leveraging access to a legitimate key card, and then using NFC Relay. NOTE: the vendor has developed Pin2Drive to mitigate this issue **EN DISPUTA** Los vehículos Tesla Model 3, permiten a atacantes abrir una puerta al aprovechar el acceso a una tarjeta de acceso legítima y luego usar el NFC Relay. NOTA: el proveedor ha desarrollado Pin2Drive para mitigar este problema • https://cansecwest.com/post/2020-03-09-22:00:00_2020_Speakers •

CVE-2020-10558
https://notcve.org/view.php?id=CVE-2020-10558
20 Mar 2020 — The driving interface of Tesla Model 3 vehicles in any release before 2020.4.10 allows Denial of Service to occur due to improper process separation, which allows attackers to disable the speedometer, web browser, climate controls, turn signal visual and sounds, navigation, autopilot notifications, along with other miscellaneous functions from the main screen. La interfaz de manejo de Tesla Model 3 en cualquier versión anterior a 2020.4.10, permite que se presente una Denegación de Servicio debido a una sep... • https://github.com/nullze/CVE-2020-10558 •

CVE-2019-9977
https://notcve.org/view.php?id=CVE-2019-9977
24 Mar 2019 — The renderer process in the entertainment system on Tesla Model 3 vehicles mishandles JIT compilation, which allows attackers to trigger firmware code execution, and display a crafted message to vehicle occupants. El proceso renderer en el sistema de entretenimiento en los vehículos de Tesla modelo 3 gestiona de manera incorrecta la compilación JIT, lo que permite que los atacantes desencadenen la ejecución de código del firmware y muestren un mensaje manipulado a los ocupantes del vehículo. • http://www.securityfocus.com/bid/107551 •