Breaking Into Tesla’s IVI System: Synacktiv’s Two-Bug Exploit Chain at Pwn2Own Automotive 2024

November 4, 2024
CyberThreat Research Lab
Breaking Into Tesla’s IVI System: Synacktiv’s Two-Bug Exploit Chain at Pwn2Own Automotive 2024

By Vit Sembera (Senior Threat Researcher, Automotive)

At Pwn2Own Automotive 2024, researchers from Synacktiv, David Berard and Vincent Dehors, delivered another impressive demonstration, continuing their streak of successful hacks against Tesla’s in-vehicle infotainment (IVI) system, which started at Pwn2Own Vancouver 2022. This time, they executed a two-bug chain to compromise Tesla’s IVI system by breaching the vehicle’s LTE connectivity card, a crucial component running on a Linux-based platform. This vulnerability allowed them to execute a remote code execution (RCE) attack, leading to a takeover of Tesla’s communication system. 

Exploiting the connectivity card 

In their presentation at OffensiveCon 2024, “0-Click RCE on the Tesla Infotainment Through Cellular Network,” the Synacktiv researchers revealed how they targeted Tesla’s LTE connectivity card, uncovering several critical weak points that granted them root-level access: 

  • The UART port had root access enabled.
  • The root file system was mounted in read/write mode.
  • A vulnerability in the AT command handler allowed them to inject arbitrary commands.
  • A race condition in the iptables firewall sometimes caused it to be inactive, providing an open window for attack. 

By leveraging these vulnerabilities, the researchers developed a sophisticated exploit chain. They mimicked a cellular network base station and manipulated connectivity checks, which allowed them to reboot the card or inject commands when the firewall was down. They ultimately disabled the firewall permanently and gained remote access via SSH.

Digging into the IVI system 

The next stage of the attack targeted Tesla’s IVI system, which runs Ofono, open-source telephony software designed to handle mobile network communication. Tesla customized Ofono with a plug-in for communicating with the LTE connectivity card, but this plug-in contained a heap buffer overflow vulnerability. Synacktiv employed advanced techniques such as heap shaping and return-oriented programming (ROP) within the system’s libc to exploit the flaw. The researchers also bypassed the XPIN security module, exploiting a memory mapping bug to avoid detection.

Escaping the sandbox 

Ofono’s daemon, a background process responsible for managing mobile network communication, was heavily sandboxed with security measures such as MiniJail, SecComp, AppArmor, and iptables. However, since the daemon had network admin privileges, the researchers were able to modify network configurations and forward packets through the IVI system to Tesla’s security gateway, allowing them to bypass these sandbox protections.

Security takeaways 

Synacktiv’s two-bug exploit chain was impressively complex, once again showcasing the team’s expertise in breaching even the most secured systems. However, the vulnerabilities they exploited were the result of common security oversights: 

  • Improper validation of input commands enabled RCE on the connectivity module.
  • Inadequate buffer size allocation led to the heap buffer overflow in Tesla’s custom Ofono plug-in.
  • Although Tesla’s system included strong hardening measures, including sandboxing and firewalls, misconfigurations and improper implementation ultimately made this breakthrough possible. 

These security takeaways emphasize that even highly secured systems can still fall to well-crafted exploitation chains, especially when small vulnerabilities are overlooked and remain unaddressed.

A background on coordinated disclosure timelines

Most might wonder why there is often a delay from the time the ZDI announces that a team has successfully hacked or “pwned” a device or software at Pwn2Own events until the subsequent publication of the techniques used in the hacks. This delay is part of the coordinated vulnerability disclosure (CVD) process, which is designed to manage zero-day vulnerabilities more responsibly.
In the 1990s, only a few hackers actively hunted for vulnerabilities, and many vendors were unprepared to handle them. Both white hat hackers and vendors had concerns, such as, “Are hackers submitting vulnerabilities in exchange for benefits?” or “Will the vulnerabilities be fixed, or will the submission be a waste of time?” It came to this compromise: Hackers first submit the vulnerabilities to the vendors, who then release a patch and publicly acknowledge the hackers for their discovery.

According to the ZDI’s disclosure policy, a submitted vulnerability is disclosed once a patch is available or after a certain period if the vendor is unresponsive. This approach prevents or lowers the risk of vulnerability exploitation by either resolving the issue or making the public aware of a threat that has no known fix. This explains the time gap between the initial submission of vulnerabilities and the detailed disclosure.

Our News and Views

Gain Insights Into Automotive Cybersecurity

  • Pwn2Own Automotive 2026 Day 3: New Master of Pwn Announced and Other Highlights
    Blog
    January 26, 2026
    Pwn2Own Automotive 2026 set a new record with 76 unique zero-day vulnerabilities discovered, exposing the rapidly expanding attack surface across SDVs, IVI systems, and EV charging infrastructure. The final day crowned Fuzzware.io as Master of Pwn 2026, with 28 Master of Pwn points.
    Read More
  • Pwn2Own Automotive 2026 Day 2: EV Chargers Hit Full Throttle
    Blog
    January 23, 2026
    Day 2 delivered 29 new zero-days, pushing the total to a record 66. Researchers repeatedly compromised Level 2/3 EV chargers and IVI systems using practical flaws like exposed interfaces and command injection. The takeaway: automotive and charging infrastructure attacks are now repeatable at scale—shifting cyber risk from theoretical to immediate operational impact.
    Read More
  • Pwn2Own Automotive 2026: Uncovering 37 Unique Zero-Days
    Blog
    January 22, 2026
    Pwn2Own Automotive 2026 Day 1 opened with record-breaking momentum, with researchers successfully compromising infotainment systems, EV chargers, and Tesla interfaces—highlighting how expansive today’s automotive attack surface has become. The surge in entries and chained exploits confirms a clear shift: in the SDV era, automotive cyber risk is no longer isolated to the vehicle, but systemic across the entire ecosystem.
    Read More
  • Pwn2Own Automotive 2026: Turning Zero-Day Discovery into Automotive Foresight
    Blog
    January 15, 2026
    Pwn2Own Automotive 2026 exposes critical zero-day vulnerabilities in software-defined vehicles before they escalate into real-world business and operational risk. By ensuring zero-day vulnerabilities move from exposure to resolution, the event transforms discovery into Automotive Foresight—helping organizations stay ahead of risk before it reaches the road.
    Read More
Visit Our Blog

Accelerate Your Automotive Cybersecurity Journey Today

Contact Us