In late 2024 a USB vulnerability (CVE-2024-53150) was reported by Google Threat Analysis Group to the Linux Kernel mailing list and was subsequently added to CISA known exploited vulnerabilities (KEV) list.
Then in early 2025, multiple other Linux Kernel USB vulnerabilities were found to have been exploited to compromise mobile phone devices in the wild (as covered by Amnesty International).
Whilst the vulnerabilities themselves have been described previously, a method of practically exploiting these issues along with ease of exploitation was not known.
NCC’s Exploit Development Group decided to answer the question – what does it take to exploit Linux Kernel USB vulnerabilities such as these against a modern Linux version?
This also led to our first discovery, which was that these USB vulnerabilities affected more than just mobile devices. Tesla’s automotive, in-vehicle infotainment (IVI) system was also vulnerable to a number of these core Linux kernel issues!
This talk is specifically about exploiting one of these vulnerabilities (CVE-2024-53150) and the novel tooling it was necessary to develop to bypass KASLR on a Tesla IVI.

