Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tesla tesla Firmware
|
|
| CPEs | cpe:2.3:o:tesla:tesla_firmware:*:*:*:*:*:android:*:* | |
| Vendors & Products |
Tesla tesla Firmware
|
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Tesla Tesla telematics Control Unit Tesla tesla |
|
| Vendors & Products |
Google
Google android Tesla Tesla telematics Control Unit Tesla tesla |
Tue, 07 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Oct 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tesla Telematics Control Unit (TCU) firmware prior to v2025.14 contains an authentication bypass vulnerability. The TCU runs the Android Debug Bridge (adbd) as root and, despite a “lockdown” check that disables adb shell, still permits adb push/pull and adb forward. Because adbd is privileged and the device’s USB port is exposed externally, an attacker with physical access can write an arbitrary file to a writable location and then overwrite the kernel’s uevent_helper or /proc/sys/kernel/hotplug entries via ADB, causing the script to be executed with root privileges. | |
| Title | Tesla Telematics Control Unit (TCU) < v2025.14 Authentication Bypass | |
| Weaknesses | CWE-269 CWE-288 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T15:43:47.684Z
Reserved: 2025-04-15T19:15:22.578Z
Link: CVE-2025-34251
Updated: 2025-10-07T16:00:00.584Z
Status : Awaiting Analysis
Published: 2025-10-07T00:15:34.357
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-34251
No data.
OpenCVE Enrichment
Updated: 2025-10-08T13:38:48Z