tesla CVE Vulnerabilities & Metrics

Focus on tesla vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About tesla Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with tesla. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total tesla CVEs: 12
Earliest CVE date: 13 Feb 2017, 21:59 UTC
Latest CVE date: 29 Mar 2023, 19:15 UTC

Latest CVE reference: CVE-2022-42431

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical tesla CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.56

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 9
4.0-6.9 3
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS tesla CVEs

These are the five CVEs with the highest CVSS scores for tesla, sorted by severity first and recency.

All CVEs for tesla

CVE-2022-42431 tesla vulnerability CVSS: 0 29 Mar 2023, 19:15 UTC

This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-17544.

CVE-2022-42430 tesla vulnerability CVSS: 0 29 Mar 2023, 19:15 UTC

This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the wowlan_config data structure. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-17543.

CVE-2022-3093 tesla vulnerability CVSS: 0 29 Mar 2023, 19:15 UTC

This vulnerability allows physical attackers to execute arbitrary code on affected Tesla vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ice_updater update mechanism. The issue results from the lack of proper validation of user-supplied firmware. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17463.

CVE-2022-37709 tesla vulnerability CVSS: 0 16 Sep 2022, 22:15 UTC

Tesla Model 3 V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app v4.23 is vulnerable to Authentication Bypass by spoofing. Tesla Model 3's Phone Key authentication is vulnerable to Man-in-the-middle attacks in the BLE channel. It allows attackers to open a door and drive the car away by leveraging access to a legitimate Phone Key.

CVE-2022-27948 tesla vulnerability CVSS: 3.3 27 Mar 2022, 13:15 UTC

Certain Tesla vehicles through 2022-03-26 allow attackers to open the charging port via a 315 MHz RF signal containing a fixed sequence of approximately one hundred symbols. NOTE: the vendor's perspective is that the behavior is as intended

CVE-2020-9306 tesla vulnerability CVSS: 5.8 18 Feb 2021, 00:15 UTC

Tesla SolarCity Solar Monitoring Gateway through 5.46.43 has a "Use of Hard-coded Credentials" issue because Digi ConnectPort X2e uses a .pyc file to store the cleartext password for the python user account.

CVE-2020-29440 tesla vulnerability CVSS: 2.1 30 Nov 2020, 22:15 UTC

Tesla Model X vehicles before 2020-11-23 do not perform certificate validation during an attempt to pair a new key fob with the body control module (BCM). This allows an attacker (who is inside a vehicle, or is otherwise able to send data over the CAN bus) to start and drive the vehicle with a spoofed key fob.

CVE-2020-29439 tesla vulnerability CVSS: 2.1 30 Nov 2020, 22:15 UTC

Tesla Model X vehicles before 2020-11-23 have key fobs that rely on five VIN digits for the authentication needed for a body control module (BCM) to initiate a Bluetooth wake-up action. (The full VIN is visible from outside the vehicle.)

CVE-2020-29438 tesla vulnerability CVSS: 3.3 30 Nov 2020, 22:15 UTC

Tesla Model X vehicles before 2020-11-23 have key fobs that accept firmware updates without signature verification. This allows attackers to construct firmware that retrieves an unlock code from a secure enclave chip.

CVE-2020-15912 tesla vulnerability CVSS: 3.3 23 Jul 2020, 15:15 UTC

Tesla Model 3 vehicles allow attackers to open a door by leveraging access to a legitimate key card, and then using NFC Relay. NOTE: the vendor has developed Pin2Drive to mitigate this issue

CVE-2019-9977 tesla vulnerability CVSS: 6.8 24 Mar 2019, 14:29 UTC

The renderer process in the entertainment system on Tesla Model 3 vehicles mishandles JIT compilation, which allows attackers to trigger firmware code execution, and display a crafted message to vehicle occupants.

CVE-2016-9337 tesla vulnerability CVSS: 4.0 13 Feb 2017, 21:59 UTC

An issue was discovered in Tesla Motors Model S automobile, all firmware versions before version 7.1 (2.36.31) with web browser functionality enabled. The vehicle's Gateway ECU is susceptible to commands that may allow an attacker to install malicious software allowing the attacker to send messages to the vehicle's CAN bus, a Command Injection.