Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28895 | Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle. Testing completed on Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5). This issue affects Model 3: With software versions from 2023.Xx before 2023.44. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://asrg.io/security-advisories/cve-2025-6785/ |
|
Fri, 05 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tesla
Tesla model 3 |
|
| Vendors & Products |
Tesla
Tesla model 3 |
Thu, 04 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 04 Sep 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle. Testing completed on Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5). This issue affects Model 3: With software versions from 2023.Xx before 2023.44. | |
| Title | Tesla Model 3 Physical CAN Bus Injection | |
| Weaknesses | CWE-1263 CWE-74 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ASRG
Published:
Updated: 2025-09-11T10:54:40.950Z
Reserved: 2025-06-27T12:29:05.458Z
Link: CVE-2025-6785
Updated: 2025-09-04T14:23:43.593Z
Status : Awaiting Analysis
Published: 2025-09-04T15:15:48.720
Modified: 2025-09-04T15:35:29.497
Link: CVE-2025-6785
No data.
OpenCVE Enrichment
Updated: 2025-09-05T14:02:45Z
EUVD