First published: Wed Apr 30 2025(Updated: )
Tesla Model S oFono AT Command Heap-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of responses from AT commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23198.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model S Firmware | ||
Tesla Model S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6031 has a high severity rating due to its potential for arbitrary code execution on affected Tesla Model S vehicles.
To mitigate CVE-2024-6031, ensure that your Tesla Model S firmware is updated to the latest version provided by Tesla.
CVE-2024-6031 affects Tesla Model S vehicles that utilize the vulnerable oFono AT Command implementation.
CVE-2024-6031 can be exploited by local attackers with access to the target modem, allowing for execution of arbitrary code.
The impact of CVE-2024-6031 includes the potential for local attackers to gain control of vehicle functions through code execution.