Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android Tesla Tesla telematics Control Unit Tesla tesla |
|
Vendors & Products |
Google
Google android Tesla Tesla telematics Control Unit Tesla tesla |
Tue, 07 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Oct 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Tesla Telematics Control Unit (TCU) firmware prior to v2025.14 contains an authentication bypass vulnerability. The TCU runs the Android Debug Bridge (adbd) as root and, despite a “lockdown” check that disables adb shell, still permits adb push/pull and adb forward. Because adbd is privileged and the device’s USB port is exposed externally, an attacker with physical access can write an arbitrary file to a writable location and then overwrite the kernel’s uevent_helper or /proc/sys/kernel/hotplug entries via ADB, causing the script to be executed with root privileges. | |
Title | Tesla Telematics Control Unit (TCU) < v2025.14 Authentication Bypass | |
Weaknesses | CWE-269 CWE-288 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-07T16:00:13.274Z
Reserved: 2025-04-15T19:15:22.578Z
Link: CVE-2025-34251

Updated: 2025-10-07T16:00:00.584Z

Status : Awaiting Analysis
Published: 2025-10-07T00:15:34.357
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-34251

No data.

Updated: 2025-10-08T13:38:48Z