There are 6 different ways to hack a Tesla Model S
The vulnerabilities were found by Lookout chief technology officer Kevin Mahaffey and Cloudflare researcher Marc Rogers.
The technical details of the flaws are currently unknown. The two researchers are scheduled to reveal the technical details on Friday at the Def Con hacking conference in Las Vegas.
"From this talk you will get an intimate understanding of how the many interconnected systems in a Tesla Model S work and most importantly how they can be hacked," read the Def Con keynote description.
"[We will] be releasing several zero-day vulnerabilities that will allow you to hack a Tesla Model S yourself - both locally and remotely."
The Wall Street Journal reports that one of the attacks force the car to power down and come to a stop. The seriousness of the flaw is questionable as the hacker requires physical access to the car to exploit it.
Tesla will release a patch fix for the flaw mentioned by the Wall Street Journal before the researchers reveal its technical details. A Tesla spokesperson told Business Insider the company is mounting rigorous security tests to fix the remaining flaws.
"We developed Model S with the highest standards of safety in every respect. Our well-developed safeguards protect every layer of our vehicle and network security system, including for the mobile app, Tesla's servers, and the car itself.
"Through our responsible reporting process, a dedicated team of top-notch Tesla security professionals works closely with the researcher community to ensure that we continue to protect our systems against vulnerabilities by constantly stress-testing, validating, and updating our safeguards."
The spokesperson had not replied to Business Insider's request for comment when the other five vulnerabilities will be fixed at the time of publishing.
The Tesla news follows reports researchers have found a software glitch hackers could theoretically us to take control of a Jeep Cherokee while it's on the move.