Tesla Model 3 V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app v4.23 is vulnerable to Authentication Bypass by spoofing. Tesla Model 3's Phone Key authentication is vulnerable to Man-in-the-middle attacks in the BLE channel. It allows attackers to open a door and drive the car away by leveraging access to a legitimate Phone Key.
References
Link | Resource |
---|---|
https://fmsh-seclab.github.io/ | Exploit Technical Description Third Party Advisory |
https://github.com/fmsh-seclab/TesMla | Third Party Advisory |
https://youtu.be/cPhYW5FzA9A | Exploit Third Party Advisory |
https://fmsh-seclab.github.io/ | Exploit Technical Description Third Party Advisory |
https://github.com/fmsh-seclab/TesMla | Third Party Advisory |
https://youtu.be/cPhYW5FzA9A | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://fmsh-seclab.github.io/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://github.com/fmsh-seclab/TesMla - Third Party Advisory | |
References | () https://youtu.be/cPhYW5FzA9A - Exploit, Third Party Advisory |
Information
Published : 2022-09-16 22:15
Updated : 2024-11-21 07:15
NVD link : CVE-2022-37709
Mitre link : CVE-2022-37709
CVE.ORG link : CVE-2022-37709
JSON object : View
Products Affected
tesla
- tesla
- model_3_firmware
- model_3
CWE
CWE-290
Authentication Bypass by Spoofing