CVE-2023-32156 Vulnerability Details

  /     /     /  

CVE-2023-32156 Metadata Quick Info

CVE Published: 03/05/2024 | CVE Updated: 18/09/2024 | CVE Year: 2023
Source: zdi | Vendor: Tesla | Product: Model 3
Status : PUBLISHED

CVE-2023-32156 Description

Tesla Model 3 Gateway Firmware Signature Validation Bypass Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute privileged code on the Tesla infotainment system in order to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from improper error-handling during the update process. An attacker can leverage this vulnerability to execute code in the context of Tesla\'s Gateway ECU. . Was ZDI-CAN-20734.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-367
CWE Name: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
Source: Tesla

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).