First published: Wed Apr 30 2025(Updated: )
This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules.
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-25-260 is considered critical due to the potential for network-adjacent attackers to bypass the firewall without authentication.
To fix ZDI-25-260, ensure that the Tesla Model S firmware is updated to the latest version provided by Tesla that addresses this vulnerability.
By exploiting ZDI-25-260, attackers can bypass the firewall on the Iris modem in affected Tesla Model S vehicles, potentially gaining unauthorized access.
ZDI-25-260 affects Tesla Model S vehicles that are running vulnerable firmware versions.
No, authentication is not required to exploit ZDI-25-260, making it particularly dangerous.