{"vulnerability": "CVE-2023-34403", "sightings": [{"uuid": "58da52b6-18f7-4d61-8dbb-17d5eaae1d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34403", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-45ff02b8-52616ac586aa8672", "content": "", "creation_timestamp": "2025-01-17T13:35:07.166554Z"}, {"uuid": "5bb78fcd-ba8c-4700-b9e5-4a0e55dba2e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34403", "type": "seen", "source": "Telegram/jtkNwjbKfYgg4Hqhi5oubFnzla5B_dy9YtbHUfh9d5isj9np", "content": "", "creation_timestamp": "2025-02-14T10:09:24.000000Z"}, {"uuid": "05fa88a1-3bf2-4e06-b028-28d7e3f98a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34403", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li3sy3plxe2i", "content": "", "creation_timestamp": "2025-02-13T23:15:33.731807Z"}, {"uuid": "e6014054-8b23-4275-b856-0a5583c08112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34403", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li3xge6ep32e", "content": "", "creation_timestamp": "2025-02-14T00:35:13.029470Z"}, {"uuid": "1c06efb5-08c0-4356-a189-832d3e738b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34403", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4383", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-34403\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T23:15:09.440\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://securelist.com/mercedes-benz-head-unit-security-research/115218/", "creation_timestamp": "2025-02-14T01:11:31.000000Z"}, {"uuid": "c119fae1-6064-4ead-81b7-76e43c320a1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34403", "type": "seen", "source": "https://t.me/cvedetector/18059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-34403 - Mercedes-Benz NTG6 In-Vehicle Network Data Exfiltration and Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-34403 \nPublished : Feb. 13, 2025, 11:15 p.m. | 33\u00a0minutes ago \nDescription : Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to this pins and get access to internal network. A race condition can be acquired and attacker can spoof \u201cUserData\u201d with desirable file path and access it though backup on USB. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T01:32:21.000000Z"}]}