CVE-2018-16806

A Pektron Passive Keyless Entry and Start (PKES) system, as used on the Tesla Model S and possibly other vehicles, relies on the DST40 cipher, which makes it easier for attackers to obtain access via an approach involving a 5.4 TB precomputation, followed by wake-frame reception and two challenge/response operations, to clone a key fob within a few seconds.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:pektron:passive_keyless_entry_and_start_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:pektron:passive_keyless_entry_and_start_system:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyless-entry-and-start-in-modern-supercars/ - Exploit, Third Party Advisory () https://www.esat.kuleuven.be/cosic/fast-furious-and-insecure-passive-keyless-entry-and-start-in-modern-supercars/ - Exploit, Third Party Advisory

Information

Published : 2018-09-10 23:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-16806

Mitre link : CVE-2018-16806

CVE.ORG link : CVE-2018-16806


JSON object : View

Products Affected

pektron

  • passive_keyless_entry_and_start_system
  • passive_keyless_entry_and_start_system_firmware
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm