SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-128115744] Tesla Gateway ECU Vulnerability

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2016-12-06OtherTeslaTencents Keen Security Lab N/ACVE-2016-9337 N/AN/AN/A

Source

						
							
								
#
# Tesla Gateway ECU Vulnerability
#


### OVERVIEW

Tencent's Keen Security Lab has identified a Gateway ECU vulnerability in Tesla Motors Inc.'s (Tesla) Model S automobile. Tesla has produced an over-the-air firmware update to mitigate this vulnerability.
This vulnerability could be exploited remotely.



### AFFECTED PRODUCTS

The following vehicle firmware build versions are affected:
All firmware versions before version 7.1 (2.36.31) with web browser functionality enabled.



### IMPACT

The vulnerability allows the vehicle's software and driving functions to be controlled remotely through the web browser, which must be launched or already running from a previous launch. This allows attackers to gain access to the vehicle's CAN bus through a firmware validation flaw in the Gateway ECU of the vehicle.
Impact to individual organizations depends on many factors that are unique to each organization. NCCIC/ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.



### BACKGROUND

Tesla is a US-based company that maintains offices in several countries around the world, including the US, Netherlands, and Japan.
The affected vehicle firmware manages the car's software and driving functions. According to Tesla, the software is deployed in the Transportation sector. Tesla reports that this product is used primarily in the United States, Europe, and Asia.



### VULNERABILITY CHARACTERIZATION

# VULNERABILITY OVERVIEW

COMMAND INJECTIONa
The vehicle's Gateway ECU is susceptible to commands that may allow an attacker to install malicious software allowing the attacker to send messages to the vehicle's CAN bus.
CVE-2016-9337b has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H)




### VULNERABILITY DETAILS

# EXPLOITABILITY

This vulnerability could be exploited remotely.



# EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.



# DIFFICULTY

Crafting a working exploit for this vulnerability would be difficult. A complex chain of exploits is required, including a web browser compromise, local privilege escalation, and custom-built firmware.



### MITIGATION

On September 18, 2016, Tesla produced an over-the-air firmware update for vehicles affected by this vulnerability
Owners of the vehicles are encouraged to update their vehicle to the latest firmware.