CVE-2023-32155 – Tesla Model 3 bcmdhd Out-Of-Bounds Write Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2023-32155
18 Jul 2023 — Tesla Model 3 bcmdhd Out-Of-Bounds Write Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute code on the wifi subsystem in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://www.zerodayinitiative.com/advisories/ZDI-23-971 • CWE-787: Out-of-bounds Write •
CVE-2022-42430 – Tesla wowlan_config Use-After-Free Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-42430
07 Oct 2022 — This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the wowlan_config data structure. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary... • https://www.zerodayinitiative.com/advisories/ZDI-22-1406 • CWE-416: Use After Free •
CVE-2022-42431 – Tesla bcmdhd Buffer Overflow Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-42431
07 Oct 2022 — This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root... • https://www.zerodayinitiative.com/advisories/ZDI-22-1407 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-37709
https://notcve.org/view.php?id=CVE-2022-37709
16 Sep 2022 — Tesla Model 3 V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app v4.23 is vulnerable to Authentication Bypass by spoofing. Tesla Model 3's Phone Key authentication is vulnerable to Man-in-the-middle attacks in the BLE channel. It allows attackers to open a door and drive the car away by leveraging access to a legitimate Phone Key. Tesla Model 3 versión V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app versión v4.23 es vulnerable a una Omisión de Autenticación por suplantación. La autenticación de la clave telefó... • https://fmsh-seclab.github.io • CWE-290: Authentication Bypass by Spoofing •
CVE-2022-3093 – Tesla ice_updater Time-Of-Check Time-Of-Use Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-3093
08 Sep 2022 — This vulnerability allows physical attackers to execute arbitrary code on affected Tesla vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ice_updater update mechanism. The issue results from the lack of proper validation of user-supplied firmware. An attacker can leverage this vulnerability to execute code in the context of root. • https://www.zerodayinitiative.com/advisories/ZDI-22-1188 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2022-27948
https://notcve.org/view.php?id=CVE-2022-27948
27 Mar 2022 — Certain Tesla vehicles through 2022-03-26 allow attackers to open the charging port via a 315 MHz RF signal containing a fixed sequence of approximately one hundred symbols. NOTE: the vendor's perspective is that the behavior is as intended Determinados vehículos Tesla versiones hasta 26-03-2022, permiten a atacantes abrir el puerto de carga por medio de una señal de RF de 315 MHz que contiene una secuencia fija de aproximadamente cien símbolos • https://github.com/pompel123/Tesla-Charging-Port-Opener • CWE-862: Missing Authorization •
CVE-2020-15912
https://notcve.org/view.php?id=CVE-2020-15912
23 Jul 2020 — Tesla Model 3 vehicles allow attackers to open a door by leveraging access to a legitimate key card, and then using NFC Relay. NOTE: the vendor has developed Pin2Drive to mitigate this issue **EN DISPUTA** Los vehículos Tesla Model 3, permiten a atacantes abrir una puerta al aprovechar el acceso a una tarjeta de acceso legítima y luego usar el NFC Relay. NOTA: el proveedor ha desarrollado Pin2Drive para mitigar este problema • https://cansecwest.com/post/2020-03-09-22:00:00_2020_Speakers •
CVE-2019-9977
https://notcve.org/view.php?id=CVE-2019-9977
24 Mar 2019 — The renderer process in the entertainment system on Tesla Model 3 vehicles mishandles JIT compilation, which allows attackers to trigger firmware code execution, and display a crafted message to vehicle occupants. El proceso renderer en el sistema de entretenimiento en los vehículos de Tesla modelo 3 gestiona de manera incorrecta la compilación JIT, lo que permite que los atacantes desencadenen la ejecución de código del firmware y muestren un mensaje manipulado a los ocupantes del vehículo. • http://www.securityfocus.com/bid/107551 •