First published: Wed Apr 30 2025(Updated: )
This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules.
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model S Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23197 is considered high due to the potential for network-adjacent attackers to bypass firewall protections.
To fix ZDI-CAN-23197, update the Tesla Model S firmware to the latest version provided by Tesla.
ZDI-CAN-23197 allows unauthorized access to network services, compromising the security of the vehicle's systems.
No, authentication is not required to exploit ZDI-CAN-23197, making it more dangerous.
ZDI-CAN-23197 specifically affects the Tesla Model S vehicles with the vulnerable firmware.