Lucene search

K
TeslaModel 3 Firmware

8 matches found

CVE
CVE
added 2022/03/27 1:15 p.m.70 views

CVE-2022-27948

Certain Tesla vehicles through 2022-03-26 allow attackers to open the charging port via a 315 MHz RF signal containing a fixed sequence of approximately one hundred symbols. NOTE: the vendor's perspective is that the behavior is as intended

7.2CVSS4.6AI score0.0007EPSS
CVE
CVE
added 2022/09/16 10:15 p.m.59 views

CVE-2022-37709

Tesla Model 3 V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app v4.23 is vulnerable to Authentication Bypass by spoofing. Tesla Model 3's Phone Key authentication is vulnerable to Man-in-the-middle attacks in the BLE channel. It allows attackers to open a door and drive the car away by leveraging acc...

5.3CVSS5.4AI score0.0001EPSS
CVE
CVE
added 2024/05/03 2:15 a.m.43 views

CVE-2023-32155

Tesla Model 3 bcmdhd Out-Of-Bounds Write Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute code on the wifi subsystem in order to exploit this vulnerabil...

7.8CVSS7.9AI score0.00059EPSS
CVE
CVE
added 2023/03/29 7:15 p.m.38 views

CVE-2022-42431

This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from th...

8.8CVSS8AI score0.00067EPSS
CVE
CVE
added 2020/07/23 3:15 p.m.33 views

CVE-2020-15912

Tesla Model 3 vehicles allow attackers to open a door by leveraging access to a legitimate key card, and then using NFC Relay. NOTE: the vendor has developed Pin2Drive to mitigate this issue

6.5CVSS6.4AI score0.00207EPSS
CVE
CVE
added 2023/03/29 7:15 p.m.33 views

CVE-2022-42430

This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the wowlan_config data struc...

8.8CVSS8.1AI score0.00067EPSS
CVE
CVE
added 2023/03/29 7:15 p.m.30 views

CVE-2022-3093

This vulnerability allows physical attackers to execute arbitrary code on affected Tesla vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ice_updater update mechanism. The issue results from the lack of proper validation of user-supplied fi...

7.6CVSS6.8AI score0.00084EPSS
CVE
CVE
added 2019/03/24 2:29 p.m.27 views

CVE-2019-9977

The renderer process in the entertainment system on Tesla Model 3 vehicles mishandles JIT compilation, which allows attackers to trigger firmware code execution, and display a crafted message to vehicle occupants.

8.8CVSS8.4AI score0.0064EPSS