var-201704-1010
Vulnerability from variot

A Man-in-the-Middle issue was discovered in Hyundai Motor America Blue Link 3.9.5 and 3.9.4. Communication channel endpoints are not verified, which may allow a remote attacker to access or influence communications between the identified endpoints. Blue Link Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained and information may be altered. HyundaiMotorBlueLink is a new car from Hyundai Motor. A security bypass vulnerability exists in HyundaiMotorAmericaBlueLink 3.9.5 and 3.9.4. An information disclosure vulnerability 2. A security-bypass vulnerability An attacker may leverage these issues to gain sensitive information and bypass certain security restrictions and perform unauthorized actions. Blue Link version 3.9.5 and 3.9.4 are vulnerable

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201704-1010",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "blue link",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hyundaiusa",
        "version": "3.9.5"
      },
      {
        "model": "blue link",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hyundaiusa",
        "version": "3.9.4"
      },
      {
        "model": "blue link",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hyundai motor america",
        "version": "3.9.4"
      },
      {
        "model": "blue link",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hyundai motor america",
        "version": "3.9.5"
      },
      {
        "model": "motor america blue link",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hyundai",
        "version": "3.9.5"
      },
      {
        "model": "motor america blue link",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hyundai",
        "version": "3.9.4"
      },
      {
        "model": "blue link",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hyundai",
        "version": "3.9.5"
      },
      {
        "model": "blue link",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hyundai",
        "version": "3.9.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "blue link",
        "version": "3.9.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "blue link",
        "version": "3.9.5"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "db": "BID",
        "id": "98033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6052"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:hyundaiusa:blue_link",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Will Hatzer and Arjun Kumar working with Rapid7.",
    "sources": [
      {
        "db": "BID",
        "id": "98033"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-6052",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "CVE-2017-6052",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "CNVD-2017-06731",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 5.5,
            "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.2,
            "id": "CVE-2017-6052",
            "impactScore": 2.5,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-6052",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-6052",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-06731",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201704-1451",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb",
            "trust": 0.2,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6052"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A Man-in-the-Middle issue was discovered in Hyundai Motor America Blue Link 3.9.5 and 3.9.4. Communication channel endpoints are not verified, which may allow a remote attacker to access or influence communications between the identified endpoints. Blue Link Contains vulnerabilities related to authorization, permissions, and access control.Information may be obtained and information may be altered. HyundaiMotorBlueLink is a new car from Hyundai Motor. A security bypass vulnerability exists in HyundaiMotorAmericaBlueLink 3.9.5 and 3.9.4. An information disclosure vulnerability\n2. A security-bypass vulnerability\nAn attacker may leverage these issues to  gain sensitive information and bypass  certain security restrictions and perform unauthorized actions. \nBlue Link version 3.9.5  and 3.9.4 are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-6052"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "db": "BID",
        "id": "98033"
      },
      {
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-6052",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-115-03",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "98033",
        "trust": 2.5
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "FAA671C0-1526-4BB8-9B04-B94BCCE92BDB",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "db": "BID",
        "id": "98033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6052"
      }
    ]
  },
  "id": "VAR-201704-1010",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      }
    ],
    "trust": 1.8
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:45:44.291000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Blue Link",
        "trust": 0.8,
        "url": "https://www.hyundaiusa.com/bluelink/index.aspx"
      },
      {
        "title": "HyundaiMotorAmericaBlueLink Security Bypass Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/93816"
      },
      {
        "title": "Hyundai Motor America Blue Link Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69680"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-300",
        "trust": 1.0
      },
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-264",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6052"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-115-03"
      },
      {
        "trust": 1.6,
        "url": "https://community.rapid7.com/community/infosec/blog/2017/04/25/r7-2017-02-hyundai-blue-link-potential-info-disclosure-fixed"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/98033"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6052"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6052"
      },
      {
        "trust": 0.3,
        "url": "https://www.hyundaiusa.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "db": "BID",
        "id": "98033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6052"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "db": "BID",
        "id": "98033"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6052"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-16T00:00:00",
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      },
      {
        "date": "2017-04-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "date": "2017-04-25T00:00:00",
        "db": "BID",
        "id": "98033"
      },
      {
        "date": "2017-05-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "date": "2017-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      },
      {
        "date": "2017-04-26T14:59:00.160000",
        "db": "NVD",
        "id": "CVE-2017-6052"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      },
      {
        "date": "2017-05-02T00:10:00",
        "db": "BID",
        "id": "98033"
      },
      {
        "date": "2017-05-31T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-003614"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      },
      {
        "date": "2024-11-21T03:28:59.717000",
        "db": "NVD",
        "id": "CVE-2017-6052"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hyundai Motor America Blue Link Security Bypass Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "faa671c0-1526-4bb8-9b04-b94bcce92bdb"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-06731"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control issues",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-1451"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…