VAR-201708-1418
Vulnerability from variot - Updated: 2023-12-18 13:02An Improper Restriction of Operations within the Bounds of a Memory Buffer issue was discovered in the Continental AG Infineon S-Gold 2 (PMB 8876) chipset on BMW several models produced between 2009-2010, Ford a limited number of P-HEV vehicles, Infiniti 2013 JX35, Infiniti 2014-2016 QX60, Infiniti 2014-2016 QX60 Hybrid, Infiniti 2014-2015 QX50, Infiniti 2014-2015 QX50 Hybrid, Infiniti 2013 M37/M56, Infiniti 2014-2016 Q70, Infiniti 2014-2016 Q70L, Infiniti 2015-2016 Q70 Hybrid, Infiniti 2013 QX56, Infiniti 2014-2016 QX 80, and Nissan 2011-2015 Leaf. A vulnerability in the temporary mobile subscriber identity (TMSI) may allow an attacker to access and control memory. This may allow remote code execution on the baseband radio processor of the TCU. BMW , Ford , Infiniti ,and Nissan On multiple models of Continental AG Infineon S-Gold 2 (PMB 8876) The chipset contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TCU is a 2G modem commonly used in modern cars produced by Continental AG to transmit data between cars and remote management tools such as web panels and mobile applications. Continental AG Infineon S-Gold 2 (PMB 8876) is prone to a remote code-execution vulnerability and a stack-based buffer-overflow vulnerability; fixes are available. An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201708-1418",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "s-gold 2 pmb 8876",
"scope": "eq",
"trust": 1.6,
"vendor": "infineon",
"version": null
},
{
"model": "s-gold 2",
"scope": null,
"trust": 0.8,
"vendor": "infineon",
"version": null
},
{
"model": "leaf",
"scope": "eq",
"trust": 0.6,
"vendor": "nissan",
"version": "2011-2015"
},
{
"model": "jx3",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2013"
},
{
"model": "qx60",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2014-2016"
},
{
"model": "qx60 hybrid",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2014-2016"
},
{
"model": "qx50",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2014-2015"
},
{
"model": "qx50 hybrid",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2014-2015"
},
{
"model": "m37/m56",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2013"
},
{
"model": "q70",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2014-2016"
},
{
"model": "q70l",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2014-2016"
},
{
"model": "q70 hybrid",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2015-2016"
},
{
"model": "qx56",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2013"
},
{
"model": "qx",
"scope": "eq",
"trust": 0.6,
"vendor": "infiniti",
"version": "2014-201680"
},
{
"model": "produced between",
"scope": "eq",
"trust": 0.6,
"vendor": "bmw",
"version": "2009-2010"
},
{
"model": "p-hev",
"scope": null,
"trust": 0.6,
"vendor": "ford",
"version": null
},
{
"model": "ag nissan leaf",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2011-20150"
},
{
"model": "ag infiniti q70 hybrid",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2015-20160"
},
{
"model": "ag infiniti qx60 hybrid",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2014-20160"
},
{
"model": "ag infiniti qx60",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2014-20160"
},
{
"model": "ag infiniti qx",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2014-2016800"
},
{
"model": "ag infiniti q70l",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2014-20160"
},
{
"model": "ag infiniti q70",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2014-20160"
},
{
"model": "ag infiniti qx50 hybrid",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2014-20150"
},
{
"model": "ag infiniti qx50",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "2014-20150"
},
{
"model": "ag infiniti qx56",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "20130"
},
{
"model": "ag infiniti m37/m56",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "20130"
},
{
"model": "ag infiniti jx35",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "20130"
},
{
"model": "ag infineon s-gold (pmb",
"scope": "eq",
"trust": 0.3,
"vendor": "continental",
"version": "28876)0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "s gold 2 pmb 8876",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"db": "CNVD",
"id": "CNVD-2017-18627"
},
{
"db": "BID",
"id": "100132"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"db": "NVD",
"id": "CVE-2017-9633"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:infineon:s-gold_2_pmb_8876:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-9633"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mickey Shkatov, Jesse Michael, and Oleksandr Bazhaniuk",
"sources": [
{
"db": "BID",
"id": "100132"
}
],
"trust": 0.3
},
"cve": "CVE-2017-9633",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Adjacent Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 8.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2017-9633",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-18627",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-9633",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-9633",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2017-18627",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201706-875",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"db": "CNVD",
"id": "CNVD-2017-18627"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"db": "NVD",
"id": "CVE-2017-9633"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Restriction of Operations within the Bounds of a Memory Buffer issue was discovered in the Continental AG Infineon S-Gold 2 (PMB 8876) chipset on BMW several models produced between 2009-2010, Ford a limited number of P-HEV vehicles, Infiniti 2013 JX35, Infiniti 2014-2016 QX60, Infiniti 2014-2016 QX60 Hybrid, Infiniti 2014-2015 QX50, Infiniti 2014-2015 QX50 Hybrid, Infiniti 2013 M37/M56, Infiniti 2014-2016 Q70, Infiniti 2014-2016 Q70L, Infiniti 2015-2016 Q70 Hybrid, Infiniti 2013 QX56, Infiniti 2014-2016 QX 80, and Nissan 2011-2015 Leaf. A vulnerability in the temporary mobile subscriber identity (TMSI) may allow an attacker to access and control memory. This may allow remote code execution on the baseband radio processor of the TCU. BMW , Ford , Infiniti ,and Nissan On multiple models of Continental AG Infineon S-Gold 2 (PMB 8876) The chipset contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TCU is a 2G modem commonly used in modern cars produced by Continental AG to transmit data between cars and remote management tools such as web panels and mobile applications. Continental AG Infineon S-Gold 2 (PMB 8876) is prone to a remote code-execution vulnerability and a stack-based buffer-overflow vulnerability; fixes are available. \nAn attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-9633"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"db": "CNVD",
"id": "CNVD-2017-18627"
},
{
"db": "BID",
"id": "100132"
},
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-9633",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-17-208-01",
"trust": 3.3
},
{
"db": "BID",
"id": "100132",
"trust": 1.9
},
{
"db": "CNVD",
"id": "CNVD-2017-18627",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201706-875",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007277",
"trust": 0.8
},
{
"db": "IVD",
"id": "E123AF2D-E7C8-4ADA-9BD8-BF07C0F405D8",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"db": "CNVD",
"id": "CNVD-2017-18627"
},
{
"db": "BID",
"id": "100132"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"db": "NVD",
"id": "CVE-2017-9633"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
]
},
"id": "VAR-201708-1418",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"db": "CNVD",
"id": "CNVD-2017-18627"
}
],
"trust": 1.8
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"db": "CNVD",
"id": "CNVD-2017-18627"
}
]
},
"last_update_date": "2023-12-18T13:02:58.771000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "https://www.infineon.com/cms/jp/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-007277"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"db": "NVD",
"id": "CVE-2017-9633"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-208-01"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/100132"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-9633"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9633"
},
{
"trust": 0.6,
"url": "http://securityaffairs.co/wordpress/61587/hacking/tcus-car-hacking.html"
},
{
"trust": 0.6,
"url": "https://media.defcon.org/def%20con%2025/def%20con%2025%20presentations/defcon-25-jesse-michael-and-mickey-shkatov-driving-down-the-rabbit-hole.pdf"
},
{
"trust": 0.3,
"url": "https://www.continental-corporation.com/en"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-18627"
},
{
"db": "BID",
"id": "100132"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"db": "NVD",
"id": "CVE-2017-9633"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"db": "CNVD",
"id": "CNVD-2017-18627"
},
{
"db": "BID",
"id": "100132"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"db": "NVD",
"id": "CVE-2017-9633"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-03T00:00:00",
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"date": "2017-08-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-18627"
},
{
"date": "2017-08-04T00:00:00",
"db": "BID",
"id": "100132"
},
{
"date": "2017-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"date": "2017-08-07T08:29:00.447000",
"db": "NVD",
"id": "CVE-2017-9633"
},
{
"date": "2017-06-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-18627"
},
{
"date": "2017-08-04T00:00:00",
"db": "BID",
"id": "100132"
},
{
"date": "2017-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-007277"
},
{
"date": "2019-10-09T23:30:44.360000",
"db": "NVD",
"id": "CVE-2017-9633"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote or local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Continental TCU Remote code execution vulnerability",
"sources": [
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"db": "CNVD",
"id": "CNVD-2017-18627"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "e123af2d-e7c8-4ada-9bd8-bf07c0f405d8"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-875"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.