First published: Wed Apr 30 2025(Updated: )
Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target system in order to exploit this vulnerability. The specific flaw exists within the ql_atfwd process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code on the target modem in the context of root. Was ZDI-CAN-23201.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model S Firmware | ||
Tesla Model S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6032 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
CVE-2024-6032 is a command injection vulnerability affecting the Tesla Model S Iris Modem that allows local attackers to execute arbitrary code.
To mitigate CVE-2024-6032, Tesla users should ensure their vehicles are running the latest firmware updates provided by Tesla.
CVE-2024-6032 affects Tesla Model S vehicles that are running older versions of the Iris Modem firmware.
Attackers exploiting CVE-2024-6032 can execute arbitrary code, potentially leading to unauthorized control over the vehicle's systems.