Vulnerability Description
Tesla Model 3 V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app v4.23 is vulnerable to Authentication Bypass by spoofing. Tesla Model 3's Phone Key authentication is vulnerable to Man-in-the-middle attacks in the BLE channel. It allows attackers to open a door and drive the car away by leveraging access to a legitimate Phone Key.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tesla | Model 3 Firmware | 11.0 |
| Tesla | Model 3 | - |
| Tesla | Tesla | 4.23 |
Related Weaknesses (CWE)
References
- https://fmsh-seclab.github.io/ExploitTechnical DescriptionThird Party Advisory
- https://github.com/fmsh-seclab/TesMlaThird Party Advisory
- https://youtu.be/cPhYW5FzA9AExploitThird Party Advisory
- https://fmsh-seclab.github.io/ExploitTechnical DescriptionThird Party Advisory
- https://github.com/fmsh-seclab/TesMlaThird Party Advisory
- https://youtu.be/cPhYW5FzA9AExploitThird Party Advisory
FAQ
What is CVE-2022-37709?
CVE-2022-37709 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Tesla Model 3 V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app v4.23 is vulnerable to Authentication Bypass by spoofing. Tesla Model 3's Phone Key authentication is vulnerable to Man-in-the-middle atta...
How severe is CVE-2022-37709?
CVE-2022-37709 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-37709?
Check the references section above for vendor advisories and patch information. Affected products include: Tesla Model 3 Firmware, Tesla Model 3, Tesla Tesla.