First published: Wed Apr 30 2025(Updated: )
Tesla Model S Iris Modem QCMAP_ConnectionManager Improper Input Validation Sandbox Escape Vulnerability. This vulnerability allows local attackers to escape the sandbox on affected affected Tesla Model S vehicles. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the QCMAP_ConnectionManager component. An attacker can abuse the service to assign LAN addresses to the WWAN. An attacker can leverage this vulnerability to access network services that were only intended to be exposed to the internal LAN. Was ZDI-CAN-23199.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model S Firmware | ||
Tesla Model S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13943 is considered a critical vulnerability as it allows local attackers to escape the sandbox on Tesla Model S vehicles.
To mitigate CVE-2024-13943, ensure that your Tesla Model S is updated with the latest firmware provided by Tesla that addresses this vulnerability.
CVE-2024-13943 allows an attacker with low privileges to execute code outside the designated sandbox environment, potentially compromising the vehicle's systems.
CVE-2024-13943 affects Tesla Model S vehicles that are running vulnerable firmware versions.
No, CVE-2024-13943 requires local access to the Tesla Model S for exploitation.