CVE-2020-15912
Summary
| CVE | CVE-2020-15912 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-07-23 15:15:00 UTC |
| Updated | 2023-11-07 03:17:00 UTC |
| Description | ** DISPUTED ** Tesla Model 3 vehicles allow attackers to open a door by leveraging access to a legitimate key card, and then using NFC Relay. NOTE: the vendor has developed Pin2Drive to mitigate this issue. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Tesla | Model 3 | - | All | All | All |
| Hardware | Tesla | Model 3 | - | All | All | All |
| Operating System | Tesla | Model 3 Firmware | - | All | All | All |
| Operating System | Tesla | Model 3 Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| NFC Relay Attack for TESLA Model 3 (Long -Range) - YouTube | MISC | www.youtube.com | Third Party Advisory |
| CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada | MISC | cansecwest.com | Third Party Advisory |
| Hacking TESLA Model 3 - NFC Relay Revisited - YouTube | MISC | www.youtube.com | |
| Speaker Bios — Car Hacking Village | MISC | www.carhackingvillage.com | |
| NFC Relay Attack for TESLA Model 3 (WIFI) - YouTube | MISC | www.youtube.com | Third Party Advisory |
| Kevin2600 on Twitter: "Although Tesla thinks they are protected from the Relay attack with PIN2Drive. But we are still able to open the door. So risk still there. Anyway, we just purely enjoy the research. I hope you guys like this one :p… https://t.co/SkWN9i0uLe" | MISC | twitter.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.