Tesla Telematics Control Unit (TCU) firmware prior to v2025.14 contains an authentication bypass vulnerability. The TCU runs the Android Debug Bridge (adbd) as root and, despite a “lockdown” check that disables adb shell, still permits adb push/pull and adb forward. Because adbd is privileged and the device’s USB port is exposed externally, an attacker with physical access can write an arbitrary file to a writable location and then overwrite the kernel’s uevent_helper or /proc/sys/kernel/hotplug entries via ADB, causing the script to be executed with root privileges.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Oct 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Tesla Telematics Control Unit (TCU) firmware prior to v2025.14 contains an authentication bypass vulnerability. The TCU runs the Android Debug Bridge (adbd) as root and, despite a “lockdown” check that disables adb shell, still permits adb push/pull and adb forward. Because adbd is privileged and the device’s USB port is exposed externally, an attacker with physical access can write an arbitrary file to a writable location and then overwrite the kernel’s uevent_helper or /proc/sys/kernel/hotplug entries via ADB, causing the script to be executed with root privileges. | |
Title | Tesla Telematics Control Unit (TCU) < v2025.14 Authentication Bypass | |
Weaknesses | CWE-269 CWE-288 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-06T23:35:22.949Z
Reserved: 2025-04-15T19:15:22.578Z
Link: CVE-2025-34251

No data.

Status : Received
Published: 2025-10-07T00:15:34.357
Modified: 2025-10-07T00:15:34.357
Link: CVE-2025-34251

No data.

No data.