// For flags

CVE-2023-28904

Bypass of secure boot process

Severity Score

5.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A logic flaw leading to a RAM buffer overflow in the bootloader component of the MIB3 infotainment unit allows an attacker with physical access to the MIB3 ECU to bypass firmware signature verification and run arbitrary code in the infotainment system at boot process.

*Credits: Danila Parnishchev from PCA Cyber Security (PCAutomotive), Polina Smirnova from PCA Cyber Security (PCAutomotive)
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Complete
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-03-27 CVE Reserved
  • 2025-06-28 CVE Published
  • 2025-06-28 CVE Updated
  • 2025-06-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
  • CAPEC-100: Overflow Buffers
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Preh Car Connect GmbH (JOYNEXT GmbH)
Search vendor "Preh Car Connect GmbH (JOYNEXT GmbH)"
Volkswagen MIB3 Infotainment System MIB3 OI MQB
Search vendor "Preh Car Connect GmbH (JOYNEXT GmbH)" for product "Volkswagen MIB3 Infotainment System MIB3 OI MQB"
<= 0304
Search vendor "Preh Car Connect GmbH (JOYNEXT GmbH)" for product "Volkswagen MIB3 Infotainment System MIB3 OI MQB" and version " <= 0304"
en
Affected