Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsTesla Hacked, 37 Zero-Days Demoed at Pwn2Own Automotive 2026
Tesla Hacked, 37 Zero-Days Demoed at Pwn2Own Automotive 2026
Cybersecurity

Tesla Hacked, 37 Zero-Days Demoed at Pwn2Own Automotive 2026

•January 21, 2026
0
BleepingComputer
BleepingComputer•Jan 21, 2026

Companies Mentioned

Tesla

Tesla

Sony

Sony

ChargePoint

ChargePoint

CHPT

Why It Matters

The findings expose critical weaknesses in vehicle infotainment and charging infrastructure, forcing OEMs to accelerate security updates and rethink threat models. Demonstrated exploits could translate into real‑world attacks if left unpatched.

Key Takeaways

  • •Tesla infotainment breached using 37 zero‑day exploits
  • •EV charger firmware vulnerable to chained attacks
  • •90‑day patch window before public disclosure
  • •Pwn2Own payouts exceed half‑million dollars day one
  • •Automotive attack surface expanding rapidly

Pulse Analysis

The Pwn2Own Automotive 2026 competition, staged in Tokyo alongside the Automotive World conference, pushes the envelope on automotive cybersecurity by targeting fully patched in‑vehicle infotainment (IVI) systems, electric‑vehicle chargers, and car operating platforms. This year’s showcase featured 37 zero‑day bugs against Tesla’s infotainment unit alone, underscoring how even tightly controlled consumer interfaces can harbor deep, exploitable flaws. By rewarding researchers with $516,500 on the first day, the event signals that the industry values rapid discovery and disclosure of vulnerabilities, encouraging a proactive security culture.

For original equipment manufacturers (OEMs) and charger vendors, the contest serves as a stark reminder that connected components are now prime targets for sophisticated attackers. The 90‑day remediation window mandated by TrendMicro’s Zero Day Initiative forces companies to prioritize patch development and coordinated disclosure processes. Failure to address these flaws promptly could lead to real‑world exploits, ranging from unauthorized vehicle control to manipulation of charging infrastructure, potentially jeopardizing driver safety and brand reputation. The financial incentives also highlight the economic calculus: investing in robust security testing can offset the costs of breach remediation and regulatory penalties.

Looking ahead, the automotive sector is likely to see heightened collaboration between security researchers, standards bodies, and manufacturers. As vehicles become more software‑defined, the attack surface will continue to broaden, encompassing over‑the‑air updates, telematics, and third‑party apps. Stakeholders must adopt continuous security testing, bug‑bounty programs, and secure development lifecycles to stay ahead of threat actors. The Pwn2Own results not only expose current weaknesses but also chart a roadmap for resilient, future‑proof vehicle architectures.

Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...