We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-6029

Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability



Description

Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules. Was ZDI-CAN-23197.

Reserved 2024-06-14 | Published 2025-04-30 | Updated 2025-04-30 | Assigner zdi


MEDIUM: 5.0CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Problem types

CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition

Product status

Default status
unknown

2023.44.29 with the AG525RGLAAR01A16M4G_OCPU_02.003.10.003 connectivity card
affected

References

www.zerodayinitiative.com/advisories/ZDI-25-260/ (ZDI-25-260)

cve.org (CVE-2024-6029)

nvd.nist.gov (CVE-2024-6029)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-6029

Support options

Helpdesk Chat, Email, Knowledgebase