{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6785","assignerOrgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","state":"PUBLISHED","assignerShortName":"ASRG","dateReserved":"2025-06-27T12:29:05.458Z","datePublished":"2025-09-04T14:13:22.348Z","dateUpdated":"2025-09-11T10:54:40.950Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Model 3","vendor":"Tesla","versions":[{"lessThan":"2023.44","status":"affected","version":"2023.xx","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Netanel Saka (Plaxidityx)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle.&nbsp; Testing completed on&nbsp;Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5).&nbsp;<p>This issue affects Model 3: With software versions from 2023.Xx before 2023.44.</p>"}],"value":"Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle.  Testing completed on Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5). This issue affects Model 3: With software versions from 2023.Xx before 2023.44."}],"impacts":[{"capecId":"CAPEC-401","descriptions":[{"lang":"en","value":"CAPEC-401 Physically Hacking Hardware"}]},{"capecId":"CAPEC-6","descriptions":[{"lang":"en","value":"CAPEC-6 Argument Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"YES","Recovery":"AUTOMATIC","Safety":"NEGLIGIBLE","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"PHYSICAL","baseScore":4.7,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"AMBER","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:D/RE:L/U:Amber","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-74","description":"CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-1263","description":"CWE-1263 Improper Physical Access Control","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","shortName":"ASRG","dateUpdated":"2025-09-11T10:54:40.950Z"},"references":[{"tags":["third-party-advisory"],"url":"https://asrg.io/security-advisories/cve-2025-6785/"}],"source":{"discovery":"EXTERNAL"},"title":"Tesla Model 3 Physical CAN Bus Injection","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-04T14:23:41.236074Z","id":"CVE-2025-6785","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-04T14:23:47.393Z"}}]}}