Tesla Model S Iris Modem QCMAP_ConnectionManager Improper Input Validation Sandbox Escape Vulnerability. This vulnerability allows local attackers to escape the sandbox on affected affected Tesla Model S vehicles. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the QCMAP_ConnectionManager component. An attacker can abuse the service to assign LAN addresses to the WWAN. An attacker can leverage this vulnerability to access network services that were only intended to be exposed to the internal LAN. Was ZDI-CAN-23199.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-262/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
12 Aug 2025, 15:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:* |
|
First Time |
Tesla model S Firmware
Tesla model S Tesla |
|
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-262/ - Third Party Advisory |
02 May 2025, 13:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-30 20:15
Updated : 2025-08-12 15:13
NVD link : CVE-2024-13943
Mitre link : CVE-2024-13943
CVE.ORG link : CVE-2024-13943
JSON object : View
Products Affected
tesla
- model_s
- model_s_firmware
CWE
CWE-20
Improper Input Validation