First published: Wed Apr 30 2025(Updated: )
This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of responses from AT commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-25-261 is classified as critical due to its potential to allow local attackers to execute arbitrary code on affected Tesla Model S vehicles.
To fix ZDI-25-261, Tesla owners should ensure their Model S firmware is updated to the latest version provided by Tesla that addresses this vulnerability.
ZDI-25-261 affects Tesla Model S vehicles with the specific firmware that contains the vulnerability in the modem's response parsing.
ZDI-25-261 can be exploited by local attackers who have gained the ability to execute code on the target modem of the affected Tesla Model S.
The implications of ZDI-25-261 include potential unauthorized access to vehicle systems, leading to severe security and safety risks.