AUTO-UPDATED

Turning Tesla Model 3’s Computer Into a Desktop PC

Security researcher David Schütz successfully bypassed hardware access barriers by purchasing salvaged Tesla Model 3 components to conduct independent vulnerability testing for the company's official bug bounty program.

Key points

  • Researcher David Schütz acquired a salvaged Tesla Model 3 Media Control Unit and Autopilot computer to study vehicle software.
  • Schütz overcame hardware connectivity challenges by sourcing a proprietary Dashboard Wiring Harness after initial attempts to patch damaged cables failed.
  • The project involved repairing a damaged power rail integrated circuit on the main control board to restore system functionality.
  • The effort highlights the creative methods security researchers use to access proprietary automotive hardware for authorized vulnerability disclosure programs.
Why it matters:

This case demonstrates the lengths to which independent researchers go to participate in automotive cybersecurity programs when official hardware is not readily available. It underscores the growing importance of bug bounty programs in identifying potential vulnerabilities within the complex software ecosystems of modern electric vehicles.

Hackaday Published by Maya Posch
Read original