First published: Fri May 03 2024(Updated: )
Tesla Model 3 Gateway Firmware Signature Validation Bypass Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute privileged code on the Tesla infotainment system in order to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from improper error-handling during the update process. An attacker can leverage this vulnerability to execute code in the context of Tesla's Gateway ECU. . Was ZDI-CAN-20734.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model 3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32156 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution on Tesla Model 3 vehicles.
To mitigate CVE-2023-32156, Tesla users should ensure their vehicle firmware is updated to the latest version provided by Tesla.
CVE-2023-32156 affects Tesla Model 3 vehicles that have not applied the necessary firmware updates.
CVE-2023-32156 enables network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles.
The impact of CVE-2023-32156 includes potential unauthorized control over critical vehicle systems, which poses a significant security risk.