Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules. Was ZDI-CAN-23197.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-260/ |
![]() ![]() |
History
Wed, 30 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 30 Apr 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules. Was ZDI-CAN-23197. | |
Title | Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability | |
Weaknesses | CWE-367 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published: 2025-04-30T20:00:25.966Z
Updated: 2025-04-30T20:13:33.588Z
Reserved: 2024-06-14T23:39:12.262Z
Link: CVE-2024-6029

Updated: 2025-04-30T20:13:08.295Z

Status : Awaiting Analysis
Published: 2025-04-30T20:15:20.900
Modified: 2025-05-02T13:53:40.163
Link: CVE-2024-6029

No data.