Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-9632 (GCVE-0-2017-9632)
Vulnerability from cvelistv5
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch |
Version: PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T17:11:02.307Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch"
}
]
}
],
"datePublic": "2017-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-311",
"description": "CWE-311",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T07:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2017-9632",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch",
"version": {
"version_data": [
{
"version_value": "PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-311"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2017-9632",
"datePublished": "2017-08-07T08:00:00",
"dateReserved": "2017-06-14T00:00:00",
"dateUpdated": "2024-08-05T17:11:02.307Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-9632\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2017-08-07T08:29:00.400\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un error de falta de cifrado de datos confidenciales en PDQ Manufacturing LaserWash G5 y G5 S Series en todas las versiones; LaserWash M5, todas las versiones; LaserWash 360 y 360 Plus, todas las versiones; LaserWash AutoXpress y AutoExpress Plus, todas las versiones; LaserJet, todas las versiones; ProTouch Tandem, todas las versiones; ProTouch ICON, todas las versiones; y ProTouch AutoGloss, todas las versiones. El usuario y la contrase\u00f1a se transmiten de forma no segura.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-311\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-311\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:laserwash_g5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5214117-D2A6-4CBE-92AB-1C10FFF53960\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:laserwash_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"478D29EF-F2EB-4FC2-8021-64A98DCFC278\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:laserwash_g5_s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8345743-9E9B-4B22-950F-B8D16B2DD389\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:laserwash_g5_s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9418A71C-C776-42D1-8C49-8E7A5A35510F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:laserwash_m5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"526E3009-4341-4510-87EF-6579B2016EA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:laserwash_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556B3850-9721-4338-BAE8-0E6827EE967F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:laserwash_360_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF481571-EA78-4915-9B56-6E20B423CA5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:laserwash_360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA3E7B3B-0A5A-4643-949B-ECA1771A67EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:laserwash_360_plus_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215A6BA3-1AE7-4452-9F09-1D47D46314F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:laserwash_360_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3FC978B-25DE-4BFC-8B35-349CB0C49059\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:laserwash_autoxpress_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D824F5-77FA-4664-A37C-AC5810102262\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:laserwash_autoxpress:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E1E23A-1A79-4863-9981-DF0E1AA971A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:laserwash_autoxpress_plus_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E34E8DC-2ADE-4100-BC53-C8E632C57BE2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:laserwash_autoxpress_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AEF583E-6F5B-42E4-B3D1-536E9497BDC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:laserjet_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FD3B5D6-773B-40BC-AFB4-39877E300D78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:laserjet:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53FAAE69-1553-4C1D-B447-FDA4AE980417\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:protouch_tandem_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4030F5FE-0CE3-4604-A4A4-F88E219CA466\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:protouch_tandem:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC802696-788D-48C2-B4E4-37DC0D733BEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:protouch_icon_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C00C452-C834-4E78-8CEF-92C4B69FB0E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:protouch_icon:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA832AF8-2250-4EF8-85DF-C6DA40CC471D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pdqinc:protouch_autogloss_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C57FFA51-B5B4-4817-9047-B7F3A74CCA31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pdqinc:protouch_autogloss:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC6A40A9-F759-4D9F-9237-1C4BACE79D07\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
ICSA-17-208-03
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Billy Rios",
"Jonathan Butts"
],
"organization": "WhiteScope",
"summary": "reporting the vulnerabilities"
},
{
"names": [
"Terry McCorkle"
],
"summary": "reporting the vulnerabilities"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "ATTENTION: Remotely exploitable/low skill level to exploit. Public exploits are available",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "De Pere, Wisconsin",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-17-208-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-208-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-17-208-03 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-208-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-208-03"
}
],
"title": "PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch",
"tracking": {
"current_release_date": "2017-07-27T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-17-208-03",
"initial_release_date": "2017-07-27T00:00:00.000000Z",
"revision_history": [
{
"date": "2017-07-27T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-17-208-03 PDQ, Inc. LaserWash Systems"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserWash M5: all versions",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "LaserWash M5"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserWash 360 and 360 Plus: all versions",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "LaserWash 360 and 360 Plus"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserWash AutoXpress and AutoExpress Plus: all versions",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "LaserWash AutoXpress and AutoExpress Plus"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "ProTouch AutoGloss: all versions",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "ProTouch AutoGloss"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "ProTouch ICON: all versions",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "ProTouch ICON"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserJet: all versions",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "LaserJet"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserWash G5 and G5 S Series: all versions",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "LaserWash G5 and G5 S Series"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "ProTouch Tandem: all versions",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "ProTouch Tandem"
}
],
"category": "vendor",
"name": "PDQ Manufacturing, Inc."
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-9630",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Affected web-server does not properly verify that provided authentication information is correct.CVE-2017-9630 has been assigned to this vulnerability. A CVSS v3 base score of 9.4 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9630"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Always make sure any PDQ equipment is not accessible from the Internet; it should be behind a secure firewall.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Whenever a machine or router is received and installed, always change the default password from the factory settings to a new password unique to the machine. If an existing site is still using the factory default passwords on a machine or router, immediately change the default password to a new, unique, strong password.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Always set up the system network (router or Wi-Fi) with its security features enabled such that they require a username and password to be able to access the machine network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Do not set up the site router with \u201cport forwarding\u201d enabled. This can effectively expose the system to the Internet and may permit an unauthorized person to reach the machine login screen.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Do not share passwords or write them down in an accessible place where unauthorized users may find them.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2017-9632",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "Username and password are transmitted insecurely.CVE-2017-9632 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9632"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Always make sure any PDQ equipment is not accessible from the Internet; it should be behind a secure firewall.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Whenever a machine or router is received and installed, always change the default password from the factory settings to a new password unique to the machine. If an existing site is still using the factory default passwords on a machine or router, immediately change the default password to a new, unique, strong password.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Always set up the system network (router or Wi-Fi) with its security features enabled such that they require a username and password to be able to access the machine network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Do not set up the site router with \u201cport forwarding\u201d enabled. This can effectively expose the system to the Internet and may permit an unauthorized person to reach the machine login screen.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Do not share passwords or write them down in an accessible place where unauthorized users may find them.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
}
]
}
icsa-17-208-03
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Billy Rios",
"Jonathan Butts"
],
"organization": "WhiteScope",
"summary": "reporting the vulnerabilities"
},
{
"names": [
"Terry McCorkle"
],
"summary": "reporting the vulnerabilities"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "ATTENTION: Remotely exploitable/low skill level to exploit. Public exploits are available",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "De Pere, Wisconsin",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-17-208-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-208-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-17-208-03 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-208-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-208-03"
}
],
"title": "PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch",
"tracking": {
"current_release_date": "2017-07-27T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-17-208-03",
"initial_release_date": "2017-07-27T00:00:00.000000Z",
"revision_history": [
{
"date": "2017-07-27T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-17-208-03 PDQ, Inc. LaserWash Systems"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserWash M5: all versions",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "LaserWash M5"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserWash 360 and 360 Plus: all versions",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "LaserWash 360 and 360 Plus"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserWash AutoXpress and AutoExpress Plus: all versions",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "LaserWash AutoXpress and AutoExpress Plus"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "ProTouch AutoGloss: all versions",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "ProTouch AutoGloss"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "ProTouch ICON: all versions",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "ProTouch ICON"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserJet: all versions",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "LaserJet"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "LaserWash G5 and G5 S Series: all versions",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "LaserWash G5 and G5 S Series"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "ProTouch Tandem: all versions",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "ProTouch Tandem"
}
],
"category": "vendor",
"name": "PDQ Manufacturing, Inc."
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-9630",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Affected web-server does not properly verify that provided authentication information is correct.CVE-2017-9630 has been assigned to this vulnerability. A CVSS v3 base score of 9.4 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9630"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Always make sure any PDQ equipment is not accessible from the Internet; it should be behind a secure firewall.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Whenever a machine or router is received and installed, always change the default password from the factory settings to a new password unique to the machine. If an existing site is still using the factory default passwords on a machine or router, immediately change the default password to a new, unique, strong password.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Always set up the system network (router or Wi-Fi) with its security features enabled such that they require a username and password to be able to access the machine network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Do not set up the site router with \u201cport forwarding\u201d enabled. This can effectively expose the system to the Internet and may permit an unauthorized person to reach the machine login screen.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Do not share passwords or write them down in an accessible place where unauthorized users may find them.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
},
{
"cve": "CVE-2017-9632",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "Username and password are transmitted insecurely.CVE-2017-9632 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9632"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Always make sure any PDQ equipment is not accessible from the Internet; it should be behind a secure firewall.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Whenever a machine or router is received and installed, always change the default password from the factory settings to a new password unique to the machine. If an existing site is still using the factory default passwords on a machine or router, immediately change the default password to a new, unique, strong password.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Always set up the system network (router or Wi-Fi) with its security features enabled such that they require a username and password to be able to access the machine network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Do not set up the site router with \u201cport forwarding\u201d enabled. This can effectively expose the system to the Internet and may permit an unauthorized person to reach the machine login screen.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
},
{
"category": "mitigation",
"details": "Do not share passwords or write them down in an accessible place where unauthorized users may find them.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008"
]
}
]
}
]
}
gsd-2017-9632
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2017-9632",
"description": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely.",
"id": "GSD-2017-9632"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-9632"
],
"details": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely.",
"id": "GSD-2017-9632",
"modified": "2023-12-13T01:21:07.311304Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2017-9632",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch",
"version": {
"version_data": [
{
"version_value": "PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-311"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:laserwash_g5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:laserwash_g5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:laserwash_g5_s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:laserwash_g5_s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:laserwash_m5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:laserwash_m5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:laserwash_360_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:laserwash_360:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:laserwash_360_plus_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:laserwash_360_plus:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:laserwash_autoxpress_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:laserwash_autoxpress:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:laserwash_autoxpress_plus_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:laserwash_autoxpress_plus:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:laserjet_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:laserjet:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:protouch_tandem_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:protouch_tandem:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:protouch_icon_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:protouch_icon:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:pdqinc:protouch_autogloss_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:pdqinc:protouch_autogloss:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2017-9632"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-311"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03",
"refsource": "MISC",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-09T23:30Z",
"publishedDate": "2017-08-07T08:29Z"
}
}
}
fkie_cve-2017-9632
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03 | Mitigation, Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03 | Mitigation, Third Party Advisory, US Government Resource |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:laserwash_g5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5214117-D2A6-4CBE-92AB-1C10FFF53960",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:laserwash_g5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "478D29EF-F2EB-4FC2-8021-64A98DCFC278",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:laserwash_g5_s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8345743-9E9B-4B22-950F-B8D16B2DD389",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:laserwash_g5_s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9418A71C-C776-42D1-8C49-8E7A5A35510F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:laserwash_m5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "526E3009-4341-4510-87EF-6579B2016EA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:laserwash_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "556B3850-9721-4338-BAE8-0E6827EE967F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:laserwash_360_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF481571-EA78-4915-9B56-6E20B423CA5B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:laserwash_360:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3E7B3B-0A5A-4643-949B-ECA1771A67EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:laserwash_360_plus_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "215A6BA3-1AE7-4452-9F09-1D47D46314F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:laserwash_360_plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3FC978B-25DE-4BFC-8B35-349CB0C49059",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:laserwash_autoxpress_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D824F5-77FA-4664-A37C-AC5810102262",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:laserwash_autoxpress:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E1E23A-1A79-4863-9981-DF0E1AA971A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:laserwash_autoxpress_plus_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E34E8DC-2ADE-4100-BC53-C8E632C57BE2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:laserwash_autoxpress_plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AEF583E-6F5B-42E4-B3D1-536E9497BDC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:laserjet_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FD3B5D6-773B-40BC-AFB4-39877E300D78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:laserjet:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53FAAE69-1553-4C1D-B447-FDA4AE980417",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:protouch_tandem_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4030F5FE-0CE3-4604-A4A4-F88E219CA466",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:protouch_tandem:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC802696-788D-48C2-B4E4-37DC0D733BEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:protouch_icon_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C00C452-C834-4E78-8CEF-92C4B69FB0E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:protouch_icon:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA832AF8-2250-4EF8-85DF-C6DA40CC471D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:pdqinc:protouch_autogloss_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C57FFA51-B5B4-4817-9047-B7F3A74CCA31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:pdqinc:protouch_autogloss:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6A40A9-F759-4D9F-9237-1C4BACE79D07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely."
},
{
"lang": "es",
"value": "Se ha descubierto un error de falta de cifrado de datos confidenciales en PDQ Manufacturing LaserWash G5 y G5 S Series en todas las versiones; LaserWash M5, todas las versiones; LaserWash 360 y 360 Plus, todas las versiones; LaserWash AutoXpress y AutoExpress Plus, todas las versiones; LaserJet, todas las versiones; ProTouch Tandem, todas las versiones; ProTouch ICON, todas las versiones; y ProTouch AutoGloss, todas las versiones. El usuario y la contrase\u00f1a se transmiten de forma no segura."
}
],
"id": "CVE-2017-9632",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-08-07T08:29:00.400",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-311"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-311"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
var-201708-1417
Vulnerability from variot
A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely. plural PDQ Manufacturing The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PDQ Manufacturing LaserWash G5 and others are all automotive automatic cleaning equipment from PDQ Manufacturing. There are security vulnerabilities in several PDQ products due to the failure of the program to pass the username and password in a secure manner. An attacker can use this vulnerability to gain access to the system and issue commands that affect the normal operation of the system. An authentication bypass vulnerability 2
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201708-1417",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "laserwash autoxpress plus",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserjet",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash g5 s",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "protouch tandem",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash 360 plus",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash m5",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash 360",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "protouch icon",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "protouch autogloss",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash autoxpress",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash g5",
"scope": "eq",
"trust": 1.0,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash 360 plus",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash 360",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash autoexpress plus",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash autoxpress",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash g5 s series",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash g5",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash m5",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "protouch autogloss",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "protouch icon",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "protouch tandem",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "manufacturing laserwash g5",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserwash g5 s",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserwash m5",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserwash",
"scope": "eq",
"trust": 0.6,
"vendor": "pdq",
"version": "360"
},
{
"model": "manufacturing laserwash plus",
"scope": "eq",
"trust": 0.6,
"vendor": "pdq",
"version": "360"
},
{
"model": "manufacturing laserwash autoxpress",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserwash autoexpress plus",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserjet",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing protouch tandem",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing protouch icon",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing protouch autogloss",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing inc protouch tandem",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc protouch icon",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc protouch autogloss",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash m5",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash g5 s",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash g5",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash autoxpress",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash autoexpress plus",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash plus",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "3600"
},
{
"model": "manufacturing inc laserwash",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "3600"
},
{
"model": "manufacturing inc laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash g5",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "protouch icon",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "protouch autogloss",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash g5 s",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash m5",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash 360",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash 360 plus",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash autoxpress",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash autoxpress plus",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserjet",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "protouch tandem",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:pdqinc:laserjet_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_360_plus_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_360_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_autoxpress_plus_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_autoxpress_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_g5_s_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_g5_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_m5_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:protouch_autogloss_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:protouch_icon_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:protouch_tandem_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Billy Rios and Jonathan Butts of WhiteScope and independent security researcher Terry McCorkle.",
"sources": [
{
"db": "BID",
"id": "100133"
}
],
"trust": 0.3
},
"cve": "CVE-2017-9632",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2017-9632",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-23005",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-117835",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2017-9632",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-9632",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2017-9632",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2017-23005",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201708-154",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-117835",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely. plural PDQ Manufacturing The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PDQ Manufacturing LaserWash G5 and others are all automotive automatic cleaning equipment from PDQ Manufacturing. There are security vulnerabilities in several PDQ products due to the failure of the program to pass the username and password in a secure manner. An attacker can use this vulnerability to gain access to the system and issue commands that affect the normal operation of the system. An authentication bypass vulnerability\n2",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-9632"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "VULHUB",
"id": "VHN-117835"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-9632",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-208-03",
"trust": 3.4
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-23005",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167",
"trust": 0.8
},
{
"db": "BID",
"id": "100133",
"trust": 0.3
},
{
"db": "IVD",
"id": "2CCB15EA-1CC2-462E-ABC8-C9DBD66EA3D3",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-117835",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"id": "VAR-201708-1417",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
}
],
"trust": 1.73333332
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
}
]
},
"last_update_date": "2024-11-23T22:48:56.116000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.pdqinc.com/"
},
{
"title": "Patch for multiple PDQ product rights acquisition vulnerabilities (CNVD-2017-23005)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/100890"
},
{
"title": "Multiple PDQ Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=72389"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-311",
"trust": 1.1
},
{
"problemtype": "CWE-310",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-208-03"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9632"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-9632"
},
{
"trust": 0.3,
"url": "http://www.pdqinc.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-26T00:00:00",
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"date": "2017-08-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"date": "2017-08-07T00:00:00",
"db": "VULHUB",
"id": "VHN-117835"
},
{
"date": "2017-07-27T00:00:00",
"db": "BID",
"id": "100133"
},
{
"date": "2017-09-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"date": "2017-07-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"date": "2017-08-07T08:29:00.400000",
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-117835"
},
{
"date": "2017-07-27T00:00:00",
"db": "BID",
"id": "100133"
},
{
"date": "2017-09-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"date": "2024-11-21T03:36:33.333000",
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural PDQ Manufacturing Cryptographic vulnerabilities in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
}
],
"trust": 0.6
}
}
cnvd-2017-23005
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页: http://www.pdqinc.com/
| Name | ['PDQ Manufacturing LaserWash G5', 'PDQ Manufacturing LaserWash G5 S', 'PDQ Manufacturing LaserWash M5', 'PDQ Manufacturing LaserWash 360', 'PDQ Manufacturing LaserWash 360 Plus', 'PDQ Manufacturing LaserWash AutoXpress', 'PDQ Manufacturing LaserWash AutoExpress Plus', 'PDQ Manufacturing LaserJet', 'PDQ Manufacturing ProTouch Tandem', 'PDQ Manufacturing ProTouch ICON', 'PDQ Manufacturing ProTouch AutoGloss'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-9632"
}
},
"description": "PDQ Manufacturing LaserWash G5\u7b49\u90fd\u662f\u7f8e\u56fdPDQ Manufacturing\u516c\u53f8\u7684\u6c7d\u8f66\u81ea\u52a8\u6e05\u6d17\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3ePDQ\u4ea7\u54c1\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u7531\u4e8e\u7a0b\u5e8f\u672a\u80fd\u4ee5\u5b89\u5168\u7684\u65b9\u5f0f\u4f20\u9012\u7528\u6237\u540d\u548c\u5bc6\u7801\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u7cfb\u7edf\u7684\u8bbf\u95ee\u6743\u9650\uff0c\u53d1\u5e03\u547d\u4ee4\uff0c\u5f71\u54cd\u7cfb\u7edf\u7684\u6b63\u5e38\u8fd0\u884c\u3002",
"discovererName": "Billy Rios and Jonathan Butts of WhiteScope and Terry McCorkle",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttp://www.pdqinc.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-23005",
"openTime": "2017-08-26",
"patchDescription": "PDQ Manufacturing LaserWash G5\u7b49\u90fd\u662f\u7f8e\u56fdPDQ Manufacturing\u516c\u53f8\u7684\u6c7d\u8f66\u81ea\u52a8\u6e05\u6d17\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3ePDQ\u4ea7\u54c1\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u7531\u4e8e\u7a0b\u5e8f\u672a\u80fd\u4ee5\u5b89\u5168\u7684\u65b9\u5f0f\u4f20\u9012\u7528\u6237\u540d\u548c\u5bc6\u7801\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u7cfb\u7edf\u7684\u8bbf\u95ee\u6743\u9650\uff0c\u53d1\u5e03\u547d\u4ee4\uff0c\u5f71\u54cd\u7cfb\u7edf\u7684\u6b63\u5e38\u8fd0\u884c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3ePDQ\u4ea7\u54c1\u6743\u9650\u83b7\u53d6\u6f0f\u6d1e\uff08CNVD-2017-23005\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"PDQ Manufacturing LaserWash G5",
"PDQ Manufacturing LaserWash G5 S",
"PDQ Manufacturing LaserWash M5",
"PDQ Manufacturing LaserWash 360",
"PDQ Manufacturing LaserWash 360 Plus",
"PDQ Manufacturing LaserWash AutoXpress",
"PDQ Manufacturing LaserWash AutoExpress Plus",
"PDQ Manufacturing LaserJet",
"PDQ Manufacturing ProTouch Tandem",
"PDQ Manufacturing ProTouch ICON",
"PDQ Manufacturing ProTouch AutoGloss"
]
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03",
"serverity": "\u9ad8",
"submitTime": "2017-08-03",
"title": "\u591a\u6b3ePDQ\u4ea7\u54c1\u6743\u9650\u83b7\u53d6\u6f0f\u6d1e\uff08CNVD-2017-23005\uff09"
}
ghsa-7m37-qwq3-wm2m
Vulnerability from github
A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely.
{
"affected": [],
"aliases": [
"CVE-2017-9632"
],
"database_specific": {
"cwe_ids": [
"CWE-311"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-08-07T08:29:00Z",
"severity": "CRITICAL"
},
"details": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely.",
"id": "GHSA-7m37-qwq3-wm2m",
"modified": "2022-05-13T01:36:07Z",
"published": "2022-05-13T01:36:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9632"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.