{"vulnerability": "CVE-2023-2891", "sightings": [{"uuid": "0968d93d-cdfd-4f70-bb2c-31a0cb2ed3f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28910", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsot2bdhed2i", "content": "", "creation_timestamp": "2025-06-28T18:49:18.151845Z"}, {"uuid": "6e214ec6-4b1f-459b-a0e6-b76be2c50015", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28911", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsotv4ntxw2r", "content": "", "creation_timestamp": "2025-06-28T19:04:19.534277Z"}, {"uuid": "ed503afd-928d-40b2-9de6-fe20ba6cf3a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28912", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsosieieh32i", "content": "", "creation_timestamp": "2025-06-28T18:39:17.610847Z"}, {"uuid": "9d536702-9978-40d8-b2ff-5a7c42b92c39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28911", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19820", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28911\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A specific flaw exists within the Bluetooth stack of the MIB3 infotainment. The issue results from the lack of proper validation of user-supplied data, which can result in an arbitrary channel disconnection. An attacker can leverage this vulnerability to cause a denial-of-service attack for every connected client of the infotainment device.\nThe vulnerability was originally discovered in Skoda Superb III car with MIB3 infotainment unit OEM part number 3V0035820. The list of affected MIB3 OEM part numbers is provided in the referenced resources.\n\ud83d\udccf Published: 2025-06-28T15:34:25.867Z\n\ud83d\udccf Modified: 2025-06-28T15:34:25.867Z\n\ud83d\udd17 References:\n1. https://i.blackhat.com/EU-24/Presentations/EU-24-Parnishchev-OverTheAirVW.pdf\n2. https://pcacybersecurity.com/resources/advisory/vulnerabilities-in-vw-mib3-infotainment-2\n3. https://asrg.io/security-advisories/vulnerabilities-in-volkswagen-mib3-infotainment-part-2/", "creation_timestamp": "2025-06-28T15:55:19.000000Z"}, {"uuid": "02617928-9d5d-47ad-8958-d78d4459489c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28910", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19819", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28910\n\ud83d\udd25 CVSS Score: 8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A specific flaw exists within the Bluetooth stack of the MIB3 infotainment system. The issue results from the disabled abortion flag eventually leading to bypassing assertion functions.\nThe vulnerability was originally discovered in Skoda Superb III car with MIB3 infotainment unit OEM part number 3V0035820. The list of affected MIB3 OEM part numbers is provided in the referenced resources.\n\ud83d\udccf Published: 2025-06-28T15:34:50.755Z\n\ud83d\udccf Modified: 2025-06-28T15:34:50.755Z\n\ud83d\udd17 References:\n1. https://i.blackhat.com/EU-24/Presentations/EU-24-Parnishchev-OverTheAirVW.pdf\n2. https://pcacybersecurity.com/resources/advisory/vulnerabilities-in-vw-mib3-infotainment-2\n3. https://asrg.io/security-advisories/vulnerabilities-in-volkswagen-mib3-infotainment-part-2/", "creation_timestamp": "2025-06-28T15:55:18.000000Z"}, {"uuid": "6f544843-34a2-448a-9cba-b60ee385cd07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28910", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lspmnppbxf2j", "content": "", "creation_timestamp": "2025-06-29T02:27:34.918095Z"}, {"uuid": "d48195dd-2aaf-43fe-be41-31818eea9784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28912", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19821", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28912\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: The MIB3 unit stores the synchronized phone contact book in clear-text, allowing an attacker with either code execution privilege on the system or physical access to the system to obtain vehicle owner's contact data.\nThe vulnerability was originally discovered in Skoda Superb III car with MIB3 infotainment unit OEM part number 3V0035820. The list of affected MIB3 OEM part numbers is provided in the referenced resources.\n\ud83d\udccf Published: 2025-06-28T15:33:58.714Z\n\ud83d\udccf Modified: 2025-06-28T15:33:58.714Z\n\ud83d\udd17 References:\n1. https://i.blackhat.com/EU-24/Presentations/EU-24-Parnishchev-OverTheAirVW.pdf\n2. https://pcacybersecurity.com/resources/advisory/vulnerabilities-in-vw-mib3-infotainment-2\n3. https://asrg.io/security-advisories/vulnerabilities-in-volkswagen-mib3-infotainment-part-2/", "creation_timestamp": "2025-06-28T15:55:20.000000Z"}]}