First published: Wed Apr 30 2025(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the VCSEC module. By manipulating the certificate response sent from the Tire Pressure Monitoring System (TPMS), an attacker can trigger an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the VCSEC module and send arbitrary messages to the vehicle CAN bus.
Affected Software | Affected Version | How to fix |
---|---|---|
Tesla Model 3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23800 is critical due to its ability to allow arbitrary code execution without authentication.
To mitigate ZDI-CAN-23800, ensure that your Tesla Model 3 is updated to the latest firmware version provided by Tesla.
Tesla Model 3 vehicles with the vulnerable VCSEC module are affected by ZDI-CAN-23800.
ZDI-CAN-23800 is associated with network-adjacent attacks that exploit vulnerabilities to execute arbitrary code.
No, authentication is not required to exploit ZDI-CAN-23800, making it particularly dangerous.