First published: Fri May 03 2024(Updated: )
Tesla Model 3 bcmdhd Out-Of-Bounds Write Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute code on the wifi subsystem in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. . Was ZDI-CAN-20733.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model 3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32155 is considered a high severity vulnerability due to its potential for local privilege escalation on affected Tesla Model 3 vehicles.
To mitigate CVE-2023-32155, Tesla owners should ensure their vehicle's software is updated to the latest version provided by Tesla.
CVE-2023-32155 affects users of the Tesla Model 3 who have not updated their vehicle's software to address this specific vulnerability.
CVE-2023-32155 allows local attackers with access to the wifi subsystem to escalate their privileges on the Tesla Model 3.
There is no public information indicating that CVE-2023-32155 is being actively exploited at this time, but it remains a significant security concern.