ID

VAR-201708-1417


CVE

CVE-2017-9632


TITLE

plural PDQ Manufacturing Cryptographic vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2017-007167

DESCRIPTION

A Missing Encryption of Sensitive Data issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The username and password are transmitted insecurely. plural PDQ Manufacturing The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PDQ Manufacturing LaserWash G5 and others are all automotive automatic cleaning equipment from PDQ Manufacturing. There are security vulnerabilities in several PDQ products due to the failure of the program to pass the username and password in a secure manner. An attacker can use this vulnerability to gain access to the system and issue commands that affect the normal operation of the system. An authentication bypass vulnerability 2

Trust: 2.7

sources: NVD: CVE-2017-9632 // JVNDB: JVNDB-2017-007167 // CNVD: CNVD-2017-23005 // BID: 100133 // IVD: 2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3 // VULHUB: VHN-117835

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3 // CNVD: CNVD-2017-23005

AFFECTED PRODUCTS

vendor:pdqincmodel:laserwash autoxpress plusscope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:laserjetscope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:laserwash g5 sscope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:protouch tandemscope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:laserwash 360 plusscope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:laserwash m5scope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:laserwash 360scope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:protouch iconscope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:protouch autoglossscope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:laserwash autoxpressscope:eqversion: -

Trust: 1.6

vendor:pdqincmodel:laserwash g5scope:eqversion: -

Trust: 1.0

vendor:pdq manufacturingmodel:laserjetscope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:laserwash 360 plusscope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:laserwash 360scope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:laserwash autoexpress plusscope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:laserwash autoxpressscope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:laserwash g5 s seriesscope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:laserwash g5scope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:laserwash m5scope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:protouch autoglossscope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:protouch iconscope:eqversion: -

Trust: 0.8

vendor:pdq manufacturingmodel:protouch tandemscope:eqversion: -

Trust: 0.8

vendor:pdqmodel:manufacturing laserwash g5scope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing laserwash g5 sscope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing laserwash m5scope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing laserwashscope:eqversion:360

Trust: 0.6

vendor:pdqmodel:manufacturing laserwash plusscope:eqversion:360

Trust: 0.6

vendor:pdqmodel:manufacturing laserwash autoxpressscope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing laserwash autoexpress plusscope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing laserjetscope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing protouch tandemscope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing protouch iconscope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing protouch autoglossscope: - version: -

Trust: 0.6

vendor:pdqmodel:manufacturing inc protouch tandemscope:eqversion:0

Trust: 0.3

vendor:pdqmodel:manufacturing inc protouch iconscope:eqversion:0

Trust: 0.3

vendor:pdqmodel:manufacturing inc protouch autoglossscope:eqversion:0

Trust: 0.3

vendor:pdqmodel:manufacturing inc laserwash m5scope:eqversion:0

Trust: 0.3

vendor:pdqmodel:manufacturing inc laserwash g5 sscope:eqversion:0

Trust: 0.3

vendor:pdqmodel:manufacturing inc laserwash g5scope:eqversion:0

Trust: 0.3

vendor:pdqmodel:manufacturing inc laserwash autoxpressscope:eqversion:0

Trust: 0.3

vendor:pdqmodel:manufacturing inc laserwash autoexpress plusscope:eqversion:0

Trust: 0.3

vendor:pdqmodel:manufacturing inc laserwash plusscope:eqversion:3600

Trust: 0.3

vendor:pdqmodel:manufacturing inc laserwashscope:eqversion:3600

Trust: 0.3

vendor:pdqmodel:manufacturing inc laserjetscope:eqversion:0

Trust: 0.3

vendor:laserwash g5model: - scope:eqversion: -

Trust: 0.2

vendor:protouch iconmodel: - scope:eqversion: -

Trust: 0.2

vendor:protouch autoglossmodel: - scope:eqversion: -

Trust: 0.2

vendor:laserwash g5 smodel: - scope:eqversion: -

Trust: 0.2

vendor:laserwash m5model: - scope:eqversion: -

Trust: 0.2

vendor:laserwash 360model: - scope:eqversion: -

Trust: 0.2

vendor:laserwash 360 plusmodel: - scope:eqversion: -

Trust: 0.2

vendor:laserwash autoxpressmodel: - scope:eqversion: -

Trust: 0.2

vendor:laserwash autoxpress plusmodel: - scope:eqversion: -

Trust: 0.2

vendor:laserjetmodel: - scope:eqversion: -

Trust: 0.2

vendor:protouch tandemmodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: 2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3 // CNVD: CNVD-2017-23005 // BID: 100133 // JVNDB: JVNDB-2017-007167 // CNNVD: CNNVD-201708-154 // NVD: CVE-2017-9632

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9632
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-9632
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-23005
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201708-154
value: CRITICAL

Trust: 0.6

IVD: 2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3
value: CRITICAL

Trust: 0.2

VULHUB: VHN-117835
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-9632
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-23005
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-117835
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-9632
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3 // CNVD: CNVD-2017-23005 // VULHUB: VHN-117835 // JVNDB: JVNDB-2017-007167 // CNNVD: CNNVD-201708-154 // NVD: CVE-2017-9632

PROBLEMTYPE DATA

problemtype:CWE-311

Trust: 1.1

problemtype:CWE-310

Trust: 0.9

sources: VULHUB: VHN-117835 // JVNDB: JVNDB-2017-007167 // NVD: CVE-2017-9632

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201708-154

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201708-154

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007167

PATCH

title:Top Pageurl:https://www.pdqinc.com/

Trust: 0.8

title:Patch for multiple PDQ product rights acquisition vulnerabilities (CNVD-2017-23005)url:https://www.cnvd.org.cn/patchInfo/show/100890

Trust: 0.6

title:Multiple PDQ Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=72389

Trust: 0.6

sources: CNVD: CNVD-2017-23005 // JVNDB: JVNDB-2017-007167 // CNNVD: CNNVD-201708-154

EXTERNAL IDS

db:NVDid:CVE-2017-9632

Trust: 3.6

db:ICS CERTid:ICSA-17-208-03

Trust: 3.4

db:CNNVDid:CNNVD-201708-154

Trust: 0.9

db:CNVDid:CNVD-2017-23005

Trust: 0.8

db:JVNDBid:JVNDB-2017-007167

Trust: 0.8

db:BIDid:100133

Trust: 0.3

db:IVDid:2CCB15EA-1CC2-462E-ABC8-C9DBD66EA3D3

Trust: 0.2

db:VULHUBid:VHN-117835

Trust: 0.1

sources: IVD: 2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3 // CNVD: CNVD-2017-23005 // VULHUB: VHN-117835 // BID: 100133 // JVNDB: JVNDB-2017-007167 // CNNVD: CNNVD-201708-154 // NVD: CVE-2017-9632

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-208-03

Trust: 3.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9632

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-9632

Trust: 0.8

url:http://www.pdqinc.com/

Trust: 0.3

sources: CNVD: CNVD-2017-23005 // VULHUB: VHN-117835 // BID: 100133 // JVNDB: JVNDB-2017-007167 // CNNVD: CNNVD-201708-154 // NVD: CVE-2017-9632

CREDITS

Billy Rios and Jonathan Butts of WhiteScope and independent security researcher Terry McCorkle.

Trust: 0.3

sources: BID: 100133

SOURCES

db:IVDid:2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3
db:CNVDid:CNVD-2017-23005
db:VULHUBid:VHN-117835
db:BIDid:100133
db:JVNDBid:JVNDB-2017-007167
db:CNNVDid:CNNVD-201708-154
db:NVDid:CVE-2017-9632

LAST UPDATE DATE

2025-04-20T23:32:06.035000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-23005date:2017-08-26T00:00:00
db:VULHUBid:VHN-117835date:2019-10-09T00:00:00
db:BIDid:100133date:2017-07-27T00:00:00
db:JVNDBid:JVNDB-2017-007167date:2017-09-12T00:00:00
db:CNNVDid:CNNVD-201708-154date:2019-10-17T00:00:00
db:NVDid:CVE-2017-9632date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:2ccb15ea-1cc2-462e-abc8-c9dbd66ea3d3date:2017-08-26T00:00:00
db:CNVDid:CNVD-2017-23005date:2017-08-26T00:00:00
db:VULHUBid:VHN-117835date:2017-08-07T00:00:00
db:BIDid:100133date:2017-07-27T00:00:00
db:JVNDBid:JVNDB-2017-007167date:2017-09-12T00:00:00
db:CNNVDid:CNNVD-201708-154date:2017-07-27T00:00:00
db:NVDid:CVE-2017-9632date:2017-08-07T08:29:00.400