ID

VAR-201708-1401


CVE

CVE-2017-9647


TITLE

Continental TCU Stack Buffer Overflow Vulnerability

Trust: 0.8

sources: IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91 // CNVD: CNVD-2017-18628

DESCRIPTION

A Stack-Based Buffer Overflow issue was discovered in the Continental AG Infineon S-Gold 2 (PMB 8876) chipset on BMW several models produced between 2009-2010, Ford a limited number of P-HEV vehicles, Infiniti 2013 JX35, Infiniti 2014-2016 QX60, Infiniti 2014-2016 QX60 Hybrid, Infiniti 2014-2015 QX50, Infiniti 2014-2015 QX50 Hybrid, Infiniti 2013 M37/M56, Infiniti 2014-2016 Q70, Infiniti 2014-2016 Q70L, Infiniti 2015-2016 Q70 Hybrid, Infiniti 2013 QX56, Infiniti 2014-2016 QX 80, and Nissan 2011-2015 Leaf. An attacker with a physical connection to the TCU may exploit a buffer overflow condition that exists in the processing of AT commands. This may allow arbitrary code execution on the baseband radio processor of the TCU. The TCU is a 2G modem commonly used in modern cars produced by Continental AG to transmit data between cars and remote management tools such as web panels and mobile applications. Continental TCU has a stack buffer overflow vulnerability that affects TCUs using S-Gold 2 (PMB 8876) cellular baseband chips. Continental AG Infineon S-Gold 2 (PMB 8876) is prone to a remote code-execution vulnerability and a stack-based buffer-overflow vulnerability; fixes are available. Failed exploit attempts will likely result in denial-of-service conditions

Trust: 2.61

sources: NVD: CVE-2017-9647 // JVNDB: JVNDB-2017-007278 // CNVD: CNVD-2017-18628 // BID: 100132 // IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91 // CNVD: CNVD-2017-18628

AFFECTED PRODUCTS

vendor:infineonmodel:s-gold 2 pmb 8876scope:eqversion: -

Trust: 1.6

vendor:infineonmodel:s-gold 2scope: - version: -

Trust: 0.8

vendor:nissanmodel:leafscope:eqversion:2011-2015

Trust: 0.6

vendor:infinitimodel:jx3scope:eqversion:2013

Trust: 0.6

vendor:infinitimodel:qx60scope:eqversion:2014-2016

Trust: 0.6

vendor:infinitimodel:qx60 hybridscope:eqversion:2014-2016

Trust: 0.6

vendor:infinitimodel:qx50scope:eqversion:2014-2015

Trust: 0.6

vendor:infinitimodel:qx50 hybridscope:eqversion:2014-2015

Trust: 0.6

vendor:infinitimodel:m37/m56scope:eqversion:2013

Trust: 0.6

vendor:infinitimodel:q70scope:eqversion:2014-2016

Trust: 0.6

vendor:infinitimodel:q70lscope:eqversion:2014-2016

Trust: 0.6

vendor:infinitimodel:q70 hybridscope:eqversion:2015-2016

Trust: 0.6

vendor:infinitimodel:qx56scope:eqversion:2013

Trust: 0.6

vendor:infinitimodel:qxscope:eqversion:2014-201680

Trust: 0.6

vendor:bmwmodel:produced betweenscope:eqversion:2009-2010

Trust: 0.6

vendor:fordmodel:p-hevscope: - version: -

Trust: 0.6

vendor:continentalmodel:ag nissan leafscope:eqversion:2011-20150

Trust: 0.3

vendor:continentalmodel:ag infiniti q70 hybridscope:eqversion:2015-20160

Trust: 0.3

vendor:continentalmodel:ag infiniti qx60 hybridscope:eqversion:2014-20160

Trust: 0.3

vendor:continentalmodel:ag infiniti qx60scope:eqversion:2014-20160

Trust: 0.3

vendor:continentalmodel:ag infiniti qxscope:eqversion:2014-2016800

Trust: 0.3

vendor:continentalmodel:ag infiniti q70lscope:eqversion:2014-20160

Trust: 0.3

vendor:continentalmodel:ag infiniti q70scope:eqversion:2014-20160

Trust: 0.3

vendor:continentalmodel:ag infiniti qx50 hybridscope:eqversion:2014-20150

Trust: 0.3

vendor:continentalmodel:ag infiniti qx50scope:eqversion:2014-20150

Trust: 0.3

vendor:continentalmodel:ag infiniti qx56scope:eqversion:20130

Trust: 0.3

vendor:continentalmodel:ag infiniti m37/m56scope:eqversion:20130

Trust: 0.3

vendor:continentalmodel:ag infiniti jx35scope:eqversion:20130

Trust: 0.3

vendor:continentalmodel:ag infineon s-gold (pmbscope:eqversion:28876)0

Trust: 0.3

vendor:s gold 2 pmb 8876model: - scope:eqversion: -

Trust: 0.2

sources: IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91 // CNVD: CNVD-2017-18628 // BID: 100132 // JVNDB: JVNDB-2017-007278 // CNNVD: CNNVD-201706-590 // NVD: CVE-2017-9647

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9647
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-9647
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-18628
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201706-590
value: MEDIUM

Trust: 0.6

IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2017-9647
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-18628
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-9647
baseSeverity: MEDIUM
baseScore: 6.6
vectorString: CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.7
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91 // CNVD: CNVD-2017-18628 // JVNDB: JVNDB-2017-007278 // CNNVD: CNNVD-201706-590 // NVD: CVE-2017-9647

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

problemtype:CWE-121

Trust: 1.0

sources: JVNDB: JVNDB-2017-007278 // NVD: CVE-2017-9647

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201706-590

TYPE

Buffer error

Trust: 0.8

sources: IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91 // CNNVD: CNNVD-201706-590

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007278

PATCH

title:トップページurl:https://www.infineon.com/cms/jp/

Trust: 0.8

sources: JVNDB: JVNDB-2017-007278

EXTERNAL IDS

db:NVDid:CVE-2017-9647

Trust: 3.5

db:ICS CERTid:ICSA-17-208-01

Trust: 3.3

db:BIDid:100132

Trust: 1.9

db:CNVDid:CNVD-2017-18628

Trust: 0.8

db:CNNVDid:CNNVD-201706-590

Trust: 0.8

db:JVNDBid:JVNDB-2017-007278

Trust: 0.8

db:IVDid:3280ABC1-3145-4FF6-91EB-0A0D63A93B91

Trust: 0.2

sources: IVD: 3280abc1-3145-4ff6-91eb-0a0d63a93b91 // CNVD: CNVD-2017-18628 // BID: 100132 // JVNDB: JVNDB-2017-007278 // CNNVD: CNNVD-201706-590 // NVD: CVE-2017-9647

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-208-01

Trust: 3.3

url:http://www.securityfocus.com/bid/100132

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2017-9647

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9647

Trust: 0.8

url:http://securityaffairs.co/wordpress/61587/hacking/tcus-car-hacking.html

Trust: 0.6

url:https://media.defcon.org/def%20con%2025/def%20con%2025%20presentations/defcon-25-jesse-michael-and-mickey-shkatov-driving-down-the-rabbit-hole.pdf

Trust: 0.6

url:https://www.continental-corporation.com/en

Trust: 0.3

sources: CNVD: CNVD-2017-18628 // BID: 100132 // JVNDB: JVNDB-2017-007278 // CNNVD: CNNVD-201706-590 // NVD: CVE-2017-9647

CREDITS

Mickey Shkatov, Jesse Michael, and Oleksandr Bazhaniuk

Trust: 0.3

sources: BID: 100132

SOURCES

db:IVDid:3280abc1-3145-4ff6-91eb-0a0d63a93b91
db:CNVDid:CNVD-2017-18628
db:BIDid:100132
db:JVNDBid:JVNDB-2017-007278
db:CNNVDid:CNNVD-201706-590
db:NVDid:CVE-2017-9647

LAST UPDATE DATE

2025-04-20T23:19:52.449000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-18628date:2017-08-03T00:00:00
db:BIDid:100132date:2017-08-04T00:00:00
db:JVNDBid:JVNDB-2017-007278date:2017-09-15T00:00:00
db:CNNVDid:CNNVD-201706-590date:2019-10-17T00:00:00
db:NVDid:CVE-2017-9647date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:3280abc1-3145-4ff6-91eb-0a0d63a93b91date:2017-08-03T00:00:00
db:CNVDid:CNVD-2017-18628date:2017-08-03T00:00:00
db:BIDid:100132date:2017-08-04T00:00:00
db:JVNDBid:JVNDB-2017-007278date:2017-09-15T00:00:00
db:CNNVDid:CNNVD-201706-590date:2017-06-15T00:00:00
db:NVDid:CVE-2017-9647date:2017-08-07T08:29:00.480