First published: Wed Apr 30 2025(Updated: )
Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules. Was ZDI-CAN-23197.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model S Firmware | ||
Tesla Model S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6029 is categorized as a high-severity vulnerability due to its ability to allow attackers to bypass the firewall without authentication.
To fix CVE-2024-6029, users should update their Tesla Model S firmware to the latest version provided by Tesla.
CVE-2024-6029 affects Tesla Model S vehicles equipped with the Iris modem.
CVE-2024-6029 is a race condition vulnerability that allows for unauthorized firewall bypass.
No, no authentication is required to exploit CVE-2024-6029, making it easier for attackers to exploit.