Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 27 Jun 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mercedes-benz
Mercedes-benz headunit Ntg6 Mercedes-benz User Experience |
|
| CPEs | cpe:2.3:a:mercedes-benz:headunit_ntg6_mercedes-benz_user_experience:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mercedes-benz
Mercedes-benz headunit Ntg6 Mercedes-benz User Experience |
Tue, 18 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 13 Feb 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to this pins and get access to internal network. A race condition can be acquired and attacker can spoof “UserData” with desirable file path and access it though backup on USB. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-18T16:11:03.215Z
Reserved: 2023-06-05T00:00:00.000Z
Link: CVE-2023-34403
Updated: 2025-02-19T16:58:14.257Z
Status : Analyzed
Published: 2025-02-13T23:15:09.440
Modified: 2025-06-27T16:12:39.147
Link: CVE-2023-34403
No data.
OpenCVE Enrichment
No data.