{ "id": "CVE-2023-32157", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:20.517", "lastModified": "2024-11-21T08:02:48.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tesla Model 3 bsa_server BIP Heap-based Buffer Overflow Arbitrary Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the bsa_server process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of an unprivileged user in a sandboxed process.\n. Was ZDI-CAN-20737." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico BIP del Tesla Model 3 bsa_server. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar c\u00f3digo arbitrario en los veh\u00edculos Tesla Model 3 afectados. Un atacante primero debe obtener la capacidad de emparejar un dispositivo Bluetooth malicioso con el sistema de destino para poder aprovechar esta vulnerabilidad. La falla espec\u00edfica existe dentro del proceso bsa_server. El problema se debe a la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en mont\u00f3n de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto de un usuario sin privilegios en un proceso de espacio aislado. Era ZDI-CAN-20737." } ], "metrics": { "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseScore": 4.6, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 1.2, "impactScore": 3.4 } ] }, "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-973/", "source": "zdi-disclosures@trendmicro.com" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-973/", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }