Product:

Headunit_ntg6_mercedes\-Benz_user_experience

(Mercedes\-Benz)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 15
Date Id Summary Products Score Patch Annotated
2025-02-13 CVE-2023-34397 Mercedes Benz head-unit NTG 6 contains functions to import or export profile settings over USB. During parsing you can trigger that the service will be crashed. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2023-34398 Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Some values of this table are serialized archive according boost library. The boost library contains a vulnerability/null pointer dereference. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2023-34399 Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Some values of this table are serialized archive according boost library. The version of boost library contains vulnerability integer overflow. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2023-34400 Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. In case of parsing file, service try to define header inside the file and convert it to null-terminated string. If character is missed, will return null pointer. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2023-34401 Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside profile folder there is a file, which is encoded with proprietary UD2 codec. Due to missed size checks in the enapsulate file, attacker can achieve Out-of-Bound Read in heap memory. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2023-34402 Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside file is encapsulate another file, which service will drop during processing. Due to missed checks, attacker can achieve Arbitrary File Write with service speech rights. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2023-34403 Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to this pins and get access to internal network. A race condition can be acquired and attacker can spoof “UserData” with desirable file path and access it though backup on USB. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2023-34404 Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to these pins and get access to internal network. As a result, by accessing a specific port an attacker can send call request to all registered services in router and achieve command injection vulnerability. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2023-34406 An issue was discovered on Mercedes Benz NTG 6. A possible integer overflow exists in the user data import/export function of NTG (New Telematics Generation) 6 head units. To perform this attack, local access to USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically. Headunit_ntg6_mercedes\-Benz_user_experience N/A
2025-02-13 CVE-2024-37600 An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible stack buffer overflow in the Service Broker service affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the Service Broker service. With prepared HTTP requests, an attacker can cause the Service-Broker service to fail. Headunit_ntg6_mercedes\-Benz_user_experience N/A