Hacking competition: Pwn2Own participants crack Tesla charging station

Obviously, infotainment systems and charging stations are not effectively secured: Almost every attack on the Pwn2Own Automotive 2025 was successful.

listen Print view

Security researchers crack infotainment systems in the Pwn2Own Automotive 2025 hacker competition: Will it run Doom? Yes, but only as a video.

(Image: Zero Day Initiative)

2 min. read

At the Pwn2Own Automotive 2025 hacking competition in Tokyo, the participants scored many hits. In total, prize money of just over 886,000 US dollars was paid out. We can only hope that car manufacturers will release security updates as soon as possible.

After all, attacks on infotainment systems can have far-reaching consequences and, in the worst case, life-threatening consequences if attackers manipulate control systems while driving.

The Pwn2Own competitions are organized by Trends Micro's Zero Day initiative. The focus is on different products and devices depending on the focus. The aim is to uncover security vulnerabilities so that manufacturers can close them.

Tesla's Wall Charger has been hit several times and attackers have successfully attacked the charging station for electric cars.

(Image: Zero Day Initiative)

Participants receive prize money for this. The security researchers must adhere to certain rules and work under time pressure. For example, the vulnerabilities must be new and previously unknown.

In this edition of the competition, the security researchers set their sights on infotainment systems and chargers for electric cars. The success rate was very high. The PHP Hooligans team successfully attacked Tesla's Wall Connector, for example.

Videos by heise

It is not yet known how the attack was carried out in detail. For security reasons, such information is being withheld for the time being so that affected manufacturers have time to respond with security patches. This attack earned the team 50,000 US dollars.

The Technical Debt Collectors team also successfully attacked this charging station. However, the bug they exploited was already known. Nevertheless, they received 12,500 US dollars. The Synacktiv team successfully exploited a vulnerability in the Kennwood DMX958XR infotainment system. As proof, they ran a video of the game "Doom" on the system's screen.

In the end, the Sina Kheirkhah team won the competition and took home 222,250 US dollars.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.