First published: Wed Apr 30 2025(Updated: )
Tesla Model S oFono Unnecessary Privileges Sandbox Escape Vulnerability. This vulnerability allows local attackers to escape the sandbox on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code within the sandbox on the target system in order to exploit this vulnerability. The specific flaw exists within the oFono process. The process allows an attacker to modify interfaces. An attacker can leverage this vulnerability to bypass the iptables network sandbox. Was ZDI-CAN-23200.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model S Firmware | ||
Tesla Model S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6030 has been classified as a high severity vulnerability due to its potential for sandbox escape on Tesla Model S vehicles.
To address CVE-2024-6030, update your Tesla Model S firmware to the latest version released by Tesla.
CVE-2024-6030 affects Tesla Model S vehicles that utilize the oFono framework.
CVE-2024-6030 can be exploited by local attackers who have gained the ability to execute code within the sandbox.
The potential impacts of CVE-2024-6030 include unauthorized access to system resources and capabilities that are typically restricted.