Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle. Testing completed on Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5). This issue affects Model 3: With software versions from 2023.Xx before 2023.44.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://asrg.io/security-advisories/cve-2025-6785/ |
![]() ![]() |
History
Fri, 05 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tesla
Tesla model 3 |
|
Vendors & Products |
Tesla
Tesla model 3 |
Thu, 04 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 04 Sep 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle. Testing completed on Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5). This issue affects Model 3: With software versions from 2023.Xx before 2023.44. | |
Title | Tesla Model 3 Physical CAN Bus Injection | |
Weaknesses | CWE-1263 CWE-74 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: ASRG
Published:
Updated: 2025-09-04T14:23:47.393Z
Reserved: 2025-06-27T12:29:05.458Z
Link: CVE-2025-6785

Updated: 2025-09-04T14:23:43.593Z

Status : Awaiting Analysis
Published: 2025-09-04T15:15:48.720
Modified: 2025-09-04T15:35:29.497
Link: CVE-2025-6785

No data.

Updated: 2025-09-05T14:02:45Z