First published: Wed Mar 29 2023(Updated: )
This vulnerability allows physical attackers to execute arbitrary code on affected Tesla vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ice_updater update mechanism. The issue results from the lack of proper validation of user-supplied firmware. An attacker can leverage this vulnerability to execute code in the context of root.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model 3 | ||
Tesla Model 3 Firmware | <2022.16.0.3 | |
Tesla Model 3 | ||
Tesla Model S Firmware | <2022.16.0.3 | |
Tesla Model S | ||
Tesla Model X Firmware | <2022.16.0.3 | |
Tesla Model X | ||
Tesla Model Y Firmware | <2022.16.0.3 | |
Tesla Model Y |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3093 is a vulnerability that allows physical attackers to execute arbitrary code on affected Tesla vehicles.
The CVE-2022-3093 vulnerability can be exploited by physical attackers without requiring authentication.
Tesla Model 3, Tesla Model S, and Tesla Model X vehicles with firmware versions up to and exclusive of 2022.16.0.3 are affected.
CVE-2022-3093 has a severity rating of 7.6 (high).
Yes, Tesla Model 3 vehicles with firmware versions up to and exclusive of 2022.16.0.3 are vulnerable to CVE-2022-3093.
It is recommended to update the firmware of affected Tesla vehicles to a version higher than 2022.16.0.3 to mitigate the CVE-2022-3093 vulnerability.