First published: Wed Apr 30 2025(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the VCSEC module. By manipulating the certificate response sent from the Tire Pressure Monitoring System (TPMS), an attacker can trigger an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the VCSEC module and send arbitrary messages to the vehicle CAN bus.
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model 3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-25-265 is critical due to its ability to allow arbitrary code execution on Tesla Model 3 vehicles.
To fix ZDI-25-265, ensure that your Tesla Model 3 is updated to the latest firmware version provided by Tesla.
ZDI-25-265 affects Tesla Model 3 vehicles specifically running vulnerable firmware versions.
ZDI-25-265 exploits a flaw in the VCSEC module, allowing unauthorized code execution via manipulated certificate responses.
No, authentication is not required to exploit ZDI-25-265, making it particularly dangerous for users.