var-201708-1417
Vulnerability from variot
A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely. plural PDQ Manufacturing The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PDQ Manufacturing LaserWash G5 and others are all automotive automatic cleaning equipment from PDQ Manufacturing. There are security vulnerabilities in several PDQ products due to the failure of the program to pass the username and password in a secure manner. An attacker can use this vulnerability to gain access to the system and issue commands that affect the normal operation of the system. An authentication bypass vulnerability 2
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201708-1417",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "laserwash autoxpress plus",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserjet",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash g5 s",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "protouch tandem",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash 360 plus",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash m5",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash 360",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "protouch icon",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "protouch autogloss",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash autoxpress",
"scope": "eq",
"trust": 1.6,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserwash g5",
"scope": "eq",
"trust": 1.0,
"vendor": "pdqinc",
"version": null
},
{
"model": "laserjet",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash 360 plus",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash 360",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash autoexpress plus",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash autoxpress",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash g5 s series",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash g5",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "laserwash m5",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "protouch autogloss",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "protouch icon",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "protouch tandem",
"scope": "eq",
"trust": 0.8,
"vendor": "pdq manufacturing",
"version": null
},
{
"model": "manufacturing laserwash g5",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserwash g5 s",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserwash m5",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserwash",
"scope": "eq",
"trust": 0.6,
"vendor": "pdq",
"version": "360"
},
{
"model": "manufacturing laserwash plus",
"scope": "eq",
"trust": 0.6,
"vendor": "pdq",
"version": "360"
},
{
"model": "manufacturing laserwash autoxpress",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserwash autoexpress plus",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing laserjet",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing protouch tandem",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing protouch icon",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing protouch autogloss",
"scope": null,
"trust": 0.6,
"vendor": "pdq",
"version": null
},
{
"model": "manufacturing inc protouch tandem",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc protouch icon",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc protouch autogloss",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash m5",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash g5 s",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash g5",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash autoxpress",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash autoexpress plus",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": "manufacturing inc laserwash plus",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "3600"
},
{
"model": "manufacturing inc laserwash",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "3600"
},
{
"model": "manufacturing inc laserjet",
"scope": "eq",
"trust": 0.3,
"vendor": "pdq",
"version": "0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash g5",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "protouch icon",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "protouch autogloss",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash g5 s",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash m5",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash 360",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash 360 plus",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash autoxpress",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserwash autoxpress plus",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "laserjet",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "protouch tandem",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:pdqinc:laserjet_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_360_plus_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_360_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_autoxpress_plus_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_autoxpress_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_g5_s_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_g5_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:laserwash_m5_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:protouch_autogloss_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:protouch_icon_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:pdqinc:protouch_tandem_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Billy Rios and Jonathan Butts of WhiteScope and independent security researcher Terry McCorkle.",
"sources": [
{
"db": "BID",
"id": "100133"
}
],
"trust": 0.3
},
"cve": "CVE-2017-9632",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2017-9632",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-23005",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-117835",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2017-9632",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-9632",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2017-9632",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2017-23005",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201708-154",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-117835",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely. plural PDQ Manufacturing The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PDQ Manufacturing LaserWash G5 and others are all automotive automatic cleaning equipment from PDQ Manufacturing. There are security vulnerabilities in several PDQ products due to the failure of the program to pass the username and password in a secure manner. An attacker can use this vulnerability to gain access to the system and issue commands that affect the normal operation of the system. An authentication bypass vulnerability\n2",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-9632"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "VULHUB",
"id": "VHN-117835"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-9632",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-208-03",
"trust": 3.4
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-23005",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167",
"trust": 0.8
},
{
"db": "BID",
"id": "100133",
"trust": 0.3
},
{
"db": "IVD",
"id": "2CCB15EA-1CC2-462E-ABC8-C9DBD66EA3D3",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-117835",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"id": "VAR-201708-1417",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
}
],
"trust": 1.73333332
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
}
]
},
"last_update_date": "2024-11-23T22:48:56.116000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.pdqinc.com/"
},
{
"title": "Patch for multiple PDQ product rights acquisition vulnerabilities (CNVD-2017-23005)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/100890"
},
{
"title": "Multiple PDQ Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=72389"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-311",
"trust": 1.1
},
{
"problemtype": "CWE-310",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-208-03"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9632"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-9632"
},
{
"trust": 0.3,
"url": "http://www.pdqinc.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"db": "VULHUB",
"id": "VHN-117835"
},
{
"db": "BID",
"id": "100133"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-26T00:00:00",
"db": "IVD",
"id": "2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3"
},
{
"date": "2017-08-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"date": "2017-08-07T00:00:00",
"db": "VULHUB",
"id": "VHN-117835"
},
{
"date": "2017-07-27T00:00:00",
"db": "BID",
"id": "100133"
},
{
"date": "2017-09-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"date": "2017-07-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"date": "2017-08-07T08:29:00.400000",
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-23005"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-117835"
},
{
"date": "2017-07-27T00:00:00",
"db": "BID",
"id": "100133"
},
{
"date": "2017-09-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-007167"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-154"
},
{
"date": "2024-11-21T03:36:33.333000",
"db": "NVD",
"id": "CVE-2017-9632"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural PDQ Manufacturing Cryptographic vulnerabilities in products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-007167"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201708-154"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.