Show filters
18 Total Results
Displaying 11-18 of 18
Sort by:
Attacker Value
Unknown
CVE-2020-9306
Disclosure Date: February 18, 2021 (last updated February 22, 2025)
Tesla SolarCity Solar Monitoring Gateway through 5.46.43 has a "Use of Hard-coded Credentials" issue because Digi ConnectPort X2e uses a .pyc file to store the cleartext password for the python user account.
0
Attacker Value
Unknown
CVE-2020-29440
Disclosure Date: November 30, 2020 (last updated February 22, 2025)
Tesla Model X vehicles before 2020-11-23 do not perform certificate validation during an attempt to pair a new key fob with the body control module (BCM). This allows an attacker (who is inside a vehicle, or is otherwise able to send data over the CAN bus) to start and drive the vehicle with a spoofed key fob.
0
Attacker Value
Unknown
CVE-2020-29439
Disclosure Date: November 30, 2020 (last updated November 28, 2024)
Tesla Model X vehicles before 2020-11-23 have key fobs that rely on five VIN digits for the authentication needed for a body control module (BCM) to initiate a Bluetooth wake-up action. (The full VIN is visible from outside the vehicle.)
0
Attacker Value
Unknown
CVE-2020-29438
Disclosure Date: November 30, 2020 (last updated February 22, 2025)
Tesla Model X vehicles before 2020-11-23 have key fobs that accept firmware updates without signature verification. This allows attackers to construct firmware that retrieves an unlock code from a secure enclave chip.
0
Attacker Value
Unknown
CVE-2020-15912
Disclosure Date: July 23, 2020 (last updated November 08, 2023)
Tesla Model 3 vehicles allow attackers to open a door by leveraging access to a legitimate key card, and then using NFC Relay. NOTE: the vendor has developed Pin2Drive to mitigate this issue
0
Attacker Value
Unknown
CVE-2020-10558
Disclosure Date: March 20, 2020 (last updated November 27, 2024)
The driving interface of Tesla Model 3 vehicles in any release before 2020.4.10 allows Denial of Service to occur due to improper process separation, which allows attackers to disable the speedometer, web browser, climate controls, turn signal visual and sounds, navigation, autopilot notifications, along with other miscellaneous functions from the main screen.
0
Attacker Value
Unknown
CVE-2019-9977
Disclosure Date: March 24, 2019 (last updated November 27, 2024)
The renderer process in the entertainment system on Tesla Model 3 vehicles mishandles JIT compilation, which allows attackers to trigger firmware code execution, and display a crafted message to vehicle occupants.
0
Attacker Value
Unknown
CVE-2016-9337
Disclosure Date: February 13, 2017 (last updated November 26, 2024)
An issue was discovered in Tesla Motors Model S automobile, all firmware versions before version 7.1 (2.36.31) with web browser functionality enabled. The vehicle's Gateway ECU is susceptible to commands that may allow an attacker to install malicious software allowing the attacker to send messages to the vehicle's CAN bus, a Command Injection.
0