Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Wednesday, February 11
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Cybersecurity»Tesla Hackers Find ‘Unpatchable’ Jailbreak to Unlock Paid Features for Free
    Cybersecurity

    Tesla Hackers Find ‘Unpatchable’ Jailbreak to Unlock Paid Features for Free

    By securnerd3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    In an unprecedented technological feat, a team of three PhD students and a security researcher from Germany has allegedly discovered a method to exploit the latest AMD-based Tesla cars, potentially establishing the world’s first persistent “Tesla Jailbreak”.

    The group is set to present a fully functional demonstration of an assault on Tesla’s contemporary AMD-based media control unit (MCU) at the forthcoming Blackhat 2023 conference. In their pre-conference brief, the researchers shed light on the intricacies of the jailbreak, revealing its roots in a known hardware exploit targeting a specific component within the MCU. The successful exploitation of this vulnerability grants access to critical systems regulating in-car purchases, possibly fooling the car into recognizing these purchases as prepaid.

    Tesla’s renowned for their sophisticated and seamlessly integrated car computers, which have roles ranging from mundane entertainment functionalities to advanced autonomous driving abilities. The briefing noted, “Tesla has recently expanded this established platform to facilitate in-car purchases, encompassing both digital features like additional connectivity and physical features such as enhanced acceleration or heated rear seats. Therefore, successfully hacking into the embedded car computer could potentially enable users to unlock these features free of charge.”

    This groundbreaking assault also permits researchers to extract a unique cryptographic key associated with each vehicle. This key plays an essential role in authenticating and authorizing a vehicle within Tesla’s service network.

    The researchers emphasized that the current fleet of Tesla cars is vulnerable to this unpatchable exploit. This suggests that regardless of software updates deployed by Tesla, potential assailants or even DIY hackers with physical access to the car can execute arbitrary code on Tesla vehicles. This security breach, rooted not in a Tesla-made component but in the embedded AMD Secure Processor (ASP) inside the MCU, is presently indefensible.

    The specifics of this exploit will only be fully revealed during the Blackhat 2023 conference. However, the researchers have indicated the use of “low-cost, off-the-shelf hardware” for the operation. It’s a complex assault but based on a previous presentation given by one of the team members, Niklas Jacob, at Black Hat 2022, it can be inferred that the methodology may be analogous.

    Tesla, known for locking installed hardware behind software, has incited a degree of customer dissatisfaction over the years. For instance, footwell lights installed in the RWD Model 3 from the factory are software disabled, and certain features such as the heated steering wheel function and heated rear seats were initially behind a software paywall. Moreover, Tesla offers a $2,000 “Acceleration Boost” upgrade for certain models, reducing zero to 60 time by half a second.

    Despite the researchers not specifically mentioning Full Self-Driving (FSD) in their list of premium features, it is significant to note that Tesla’s software is a significant part of its revenue stream. Often perceived as a software company that also manufactures cars, Tesla’s knack for creating software-centric vehicles that customers are eager to upgrade has proven profitable. Thus, a persistent “Tesla Jailbreak” could pose significant financial and security challenges for the company.

    As vehicle technologies evolve to incorporate more sophisticated computer systems, such exploits are likely to become more prevalent. This may even initiate a new era of vehicle modification—although car manufacturers may strongly resist, preferring to incentivize hackers to share their findings to allow for patching, in some cases even offering free cars in exchange for this information.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 61

    Related Posts

    • FTC Enforces Strict Measures Against InMarket for Unauthorized Sale of Precise User Location Data
    • Why Do Restaurant Burgers Taste Better?
    • Amazon sends Mastercard, Google Play gift card order emails by mistake
    • Top Men’s Fashion Trends From Spring
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    Malicious Ads Exploit macOS Users, Unleashing Stealer Malware

    April 1, 202418 Views

    Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology

    July 26, 202316 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.