var-201708-1418
Vulnerability from variot

An Improper Restriction of Operations within the Bounds of a Memory Buffer issue was discovered in the Continental AG Infineon S-Gold 2 (PMB 8876) chipset on BMW several models produced between 2009-2010, Ford a limited number of P-HEV vehicles, Infiniti 2013 JX35, Infiniti 2014-2016 QX60, Infiniti 2014-2016 QX60 Hybrid, Infiniti 2014-2015 QX50, Infiniti 2014-2015 QX50 Hybrid, Infiniti 2013 M37/M56, Infiniti 2014-2016 Q70, Infiniti 2014-2016 Q70L, Infiniti 2015-2016 Q70 Hybrid, Infiniti 2013 QX56, Infiniti 2014-2016 QX 80, and Nissan 2011-2015 Leaf. A vulnerability in the temporary mobile subscriber identity (TMSI) may allow an attacker to access and control memory. This may allow remote code execution on the baseband radio processor of the TCU. BMW , Ford , Infiniti ,and Nissan On multiple models of Continental AG Infineon S-Gold 2 (PMB 8876) The chipset contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TCU is a 2G modem commonly used in modern cars produced by Continental AG to transmit data between cars and remote management tools such as web panels and mobile applications. Continental AG Infineon S-Gold 2 (PMB 8876) is prone to a remote code-execution vulnerability and a stack-based buffer-overflow vulnerability; fixes are available. An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1418",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "s-gold 2 pmb 8876",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "infineon",
        "version": null
      },
      {
        "model": "s-gold 2",
        "scope": null,
        "trust": 0.8,
        "vendor": "infineon",
        "version": null
      },
      {
        "model": "leaf",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "nissan",
        "version": "2011-2015"
      },
      {
        "model": "jx3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2013"
      },
      {
        "model": "qx60",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2014-2016"
      },
      {
        "model": "qx60 hybrid",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2014-2016"
      },
      {
        "model": "qx50",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2014-2015"
      },
      {
        "model": "qx50 hybrid",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2014-2015"
      },
      {
        "model": "m37/m56",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2013"
      },
      {
        "model": "q70",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2014-2016"
      },
      {
        "model": "q70l",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2014-2016"
      },
      {
        "model": "q70 hybrid",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2015-2016"
      },
      {
        "model": "qx56",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2013"
      },
      {
        "model": "qx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "infiniti",
        "version": "2014-201680"
      },
      {
        "model": "produced between",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "bmw",
        "version": "2009-2010"
      },
      {
        "model": "p-hev",
        "scope": null,
        "trust": 0.6,
        "vendor": "ford",
        "version": null
      },
      {
        "model": "ag nissan leaf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2011-20150"
      },
      {
        "model": "ag infiniti q70 hybrid",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2015-20160"
      },
      {
        "model": "ag infiniti qx60 hybrid",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2014-20160"
      },
      {
        "model": "ag infiniti qx60",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2014-20160"
      },
      {
        "model": "ag infiniti qx",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2014-2016800"
      },
      {
        "model": "ag infiniti q70l",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2014-20160"
      },
      {
        "model": "ag infiniti q70",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2014-20160"
      },
      {
        "model": "ag infiniti qx50 hybrid",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2014-20150"
      },
      {
        "model": "ag infiniti qx50",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "2014-20150"
      },
      {
        "model": "ag infiniti qx56",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "20130"
      },
      {
        "model": "ag infiniti m37/m56",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "20130"
      },
      {
        "model": "ag infiniti jx35",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "20130"
      },
      {
        "model": "ag infineon s-gold (pmb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "continental",
        "version": "28876)0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "s gold 2 pmb 8876",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      },
      {
        "db": "BID",
        "id": "100132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9633"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:infineon:s-gold_2_pmb_8876",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mickey Shkatov, Jesse Michael, and Oleksandr Bazhaniuk",
    "sources": [
      {
        "db": "BID",
        "id": "100132"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-9633",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2017-9633",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-18627",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2017-9633",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-9633",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-9633",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-18627",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201706-875",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9633"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An Improper Restriction of Operations within the Bounds of a Memory Buffer issue was discovered in the Continental AG Infineon S-Gold 2 (PMB 8876) chipset on BMW several models produced between 2009-2010, Ford a limited number of P-HEV vehicles, Infiniti 2013 JX35, Infiniti 2014-2016 QX60, Infiniti 2014-2016 QX60 Hybrid, Infiniti 2014-2015 QX50, Infiniti 2014-2015 QX50 Hybrid, Infiniti 2013 M37/M56, Infiniti 2014-2016 Q70, Infiniti 2014-2016 Q70L, Infiniti 2015-2016 Q70 Hybrid, Infiniti 2013 QX56, Infiniti 2014-2016 QX 80, and Nissan 2011-2015 Leaf. A vulnerability in the temporary mobile subscriber identity (TMSI) may allow an attacker to access and control memory. This may allow remote code execution on the baseband radio processor of the TCU. BMW , Ford , Infiniti ,and Nissan On multiple models of Continental AG Infineon S-Gold 2 (PMB 8876) The chipset contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TCU is a 2G modem commonly used in modern cars produced by Continental AG to transmit data between cars and remote management tools such as web panels and mobile applications. Continental AG Infineon S-Gold 2 (PMB 8876) is prone to a remote code-execution vulnerability and a stack-based buffer-overflow vulnerability; fixes are available. \nAn attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-9633"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      },
      {
        "db": "BID",
        "id": "100132"
      },
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-9633",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-208-01",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "100132",
        "trust": 1.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-875",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "E123AF2D-E7C8-4ADA-9BD8-BF07C0F405D8",
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      },
      {
        "db": "BID",
        "id": "100132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9633"
      }
    ]
  },
  "id": "VAR-201708-1418",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      }
    ],
    "trust": 1.8
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:59:15.828000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
        "trust": 0.8,
        "url": "https://www.infineon.com/cms/jp/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9633"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-208-01"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/100132"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9633"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9633"
      },
      {
        "trust": 0.6,
        "url": "http://securityaffairs.co/wordpress/61587/hacking/tcus-car-hacking.html"
      },
      {
        "trust": 0.6,
        "url": "https://media.defcon.org/def%20con%2025/def%20con%2025%20presentations/defcon-25-jesse-michael-and-mickey-shkatov-driving-down-the-rabbit-hole.pdf"
      },
      {
        "trust": 0.3,
        "url": "https://www.continental-corporation.com/en"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      },
      {
        "db": "BID",
        "id": "100132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9633"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      },
      {
        "db": "BID",
        "id": "100132"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9633"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-03T00:00:00",
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "date": "2017-08-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      },
      {
        "date": "2017-08-04T00:00:00",
        "db": "BID",
        "id": "100132"
      },
      {
        "date": "2017-09-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "date": "2017-06-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      },
      {
        "date": "2017-08-07T08:29:00.447000",
        "db": "NVD",
        "id": "CVE-2017-9633"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      },
      {
        "date": "2017-08-04T00:00:00",
        "db": "BID",
        "id": "100132"
      },
      {
        "date": "2017-09-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-007277"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      },
      {
        "date": "2024-11-21T03:36:33.460000",
        "db": "NVD",
        "id": "CVE-2017-9633"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Continental TCU Remote code execution vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-18627"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-875"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…