0-click RCE on Tesla Model 3 through TPMS Sensors
Description
This presentation describes the research we did for Pwn2Own Vancouver 2024, specifically targeting the Tesla Model 3. Tesla has designed an Electronic Control Unit (ECU) for security access, named VCSEC. This critical component is responsible for interfacing with users' smartphones to unlock and start the vehicle, as well as managing the Tire Pressure Monitoring System (TPMS) features. TPMS sensors, integrated into the car tires, continuously monitor and report tire pressure to the central system. If the tire pressure deviates from the optimal range, the user receives a warning via the infotainment user interface. VCSEC incorporates multiple communication interfaces. Both TPMS sensors and smartphones use Bluetooth Low Energy (BLE) to communicate with the ECU. Additionally, smartphones can employ the Ultra Wide Band (UWB) interface for enhanced communication. The core of this presentation is based around a critical vulnerability identified in the TPMS message handling process. This flaw enables remote code execution within the VCSEC, a highly sensitive ECU, allowing attackers to inject and execute arbitrary code. Consequently, the attacker can send Controller Area Network (CAN) messages across the vehicle’s bus, potentially manipulating other interconnected ECUs. Furthermore, we will showcase a method to introduce a TPMS sensor without requiring any user interaction, thus demonstrating a true 0-click exploit scenario.