{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-28899","assignerOrgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","state":"PUBLISHED","assignerShortName":"ASRG","dateReserved":"2023-03-27T14:51:13.968Z","datePublished":"2024-01-12T16:32:07.082Z","dateUpdated":"2024-10-25T20:21:34.771Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Superb III","vendor":"Škoda","versions":[{"lessThanOrEqual":"2022","status":"affected","version":"0","versionType":"2.0 TDI"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Abdellah Benotsmane (PCAutomotive)"},{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Danila Parnishchev (PCAutomotive)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"By sending a specific reset UDS request via OBDII port of Skoda vehicles, it is possible to cause vehicle engine shutdown and denial of service of other vehicle components even when the vehicle is moving at a high speed. No safety critical functions affected.&nbsp;"}],"value":"By sending a specific reset UDS request via OBDII port of Skoda vehicles, it is possible to cause vehicle engine shutdown and denial of service of other vehicle components even when the vehicle is moving at a high speed. No safety critical functions affected. "}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":4.7,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","shortName":"ASRG","dateUpdated":"2024-01-12T16:32:07.082Z"},"references":[{"url":"https://asrg.io/security-advisories/cve-2023-28899"}],"source":{"discovery":"EXTERNAL"},"title":"Denial of Service via ECU reset service","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T13:51:39.129Z"},"title":"CVE Program Container","references":[{"url":"https://asrg.io/security-advisories/cve-2023-28899","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-770","lang":"en","description":"CWE-770 Allocation of Resources Without Limits or Throttling"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-25T20:18:07.199360Z","id":"CVE-2023-28899","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-25T20:21:34.771Z"}}]}}