The exploit is related to a new feature that was added byTesla last August. The feature allows drivers to turn on their cars simply by opening the door with a near field communication card. The cards can be used to interact with the car's computer system. The car starts up on its own after 130 seconds when the door is unlocked. As soon as the driver's butt is in the seat, it allows the car to start.

Martin Herfurt, an Austrian security researcher, said that the new mode is vulnerable to a unique exploit. According to Herfurt, the feature that turns your car on automatically is not the only thing that puts it in a state where the car can be unlocked. The Model 3 can be unlocked with a key or a mobile app registered to the owner.

Herfurt created his own mobile app, which he dubbed the "TeslaKee," which he says is able to "whitelist" itself as a key that can open, and which he says is able to communicate with the feature in VC Sec. Herfurt claims that a new feature can be used to remotely add keys. He showed how the exploit could be used. It is very easy. You can take a look at it below.

It's ridiculous that you'd have to be in that situation for this to happen. The hacker would have to do Herfurt's work first. They would have to sit and wait for you. They would trail you until you reached a destination and left. They could take control of your ride. Weirder things have occurred in the world of cyber crime.

We couldn't get in touch with the company because they shut down their PR department. We might ask him about it on the social networking site.