Scary remote over WiFi bug. Tesla fixed with 2019.36.2 over air update.https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/ …
An impressive feat! But just to be clear, this involves an attacker that is connected to the same WiFi network as the car, correct?
-
-
Its not completely clear: 1. The attacker sends DEAUTH frames to all the AP nearby. 2. When Tesla reconnects to AP, the attacker gets the MAC address of Tesla. 3. Spray the fake pointer, then trigger the vulnerability in firmware by directly send corrupt Action Frame.
-
It's this part that seems to make it clear. Sending a WMM response to the Tesla isn't something I'd think that an outsider could do.pic.twitter.com/kykToEVCTL
- 2 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.