Home

Description

Tesla Telematics Control Unit (TCU) firmware prior to v2025.14 contains an authentication bypass vulnerability. The TCU runs the Android Debug Bridge (adbd) as root and, despite a “lockdown” check that disables adb shell, still permits adb push/pull and adb forward. Because adbd is privileged and the device’s USB port is exposed externally, an attacker with physical access can write an arbitrary file to a writable location and then overwrite the kernel’s uevent_helper or /proc/sys/kernel/hotplug entries via ADB, causing the script to be executed with root privileges.

PUBLISHED Reserved 2025-04-15 | Published 2025-10-06 | Updated 2025-10-07 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-269 Improper Privilege Management

CWE-288 Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unaffected

* before 2025.14
affected

Credits

Alex Plaskett and McCaulay Hudson of NCC Group finder

References

www.tesla.com/ product

www.nccgroup.com/...telematics-control-unit-adb-auth-bypass/ technical-description exploit

www.vulncheck.com/advisories/tesla-tcu-auth-bypass third-party-advisory

cve.org (CVE-2025-34251)

nvd.nist.gov (CVE-2025-34251)

Download JSON