CVE-2017-9630

9.4 CRITICAL

📋 TL;DR

An improper authentication vulnerability in PDQ Manufacturing car wash systems allows attackers to bypass authentication on the web interface. This affects all versions of LaserWash, LaserJet, and ProTouch series car wash controllers. Attackers can gain unauthorized access to control systems without valid credentials.

💻 Affected Systems

Products:
  • PDQ Manufacturing LaserWash G5
  • LaserWash G5 S Series
  • LaserWash M5
  • LaserWash 360
  • LaserWash 360 Plus
  • LaserWash AutoXpress
  • LaserWash AutoExpress Plus
  • LaserJet
  • ProTouch Tandem
  • ProTouch ICON
  • ProTouch AutoGloss
Versions: All versions
Operating Systems: Embedded systems in car wash controllers
Default Config Vulnerable: ⚠️ Yes
Notes: All versions of listed products are vulnerable. No specific OS information provided in advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of car wash control systems allowing remote attackers to manipulate equipment, cause physical damage, disrupt operations, or access sensitive business data.

🟠

Likely Case

Unauthorized access to control panels allowing configuration changes, operational disruption, or data theft from the affected systems.

🟢

If Mitigated

Limited impact if systems are isolated from untrusted networks and have additional authentication layers.

🌐 Internet-Facing: HIGH - Systems exposed to the internet are directly vulnerable to remote exploitation without authentication.
🏢 Internal Only: HIGH - Even internally, any user on the network can bypass authentication to gain control system access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass typically requires minimal technical skill. No public exploit code mentioned in advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory - contact vendor for latest firmware

Vendor Advisory: https://ics-cert.us-cert.gov/advisories/ICSA-17-208-03

Restart Required: Yes

Instructions:

1. Contact PDQ Manufacturing for latest firmware updates. 2. Apply firmware updates to all affected systems. 3. Restart systems after update. 4. Verify authentication is properly enforced.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate car wash control systems from untrusted networks and internet access

Access Control Lists

all

Implement network ACLs to restrict access to car wash controller web interfaces

🧯 If You Can't Patch

  • Segment affected systems on isolated VLAN with strict firewall rules
  • Implement additional authentication layer (VPN, reverse proxy with auth) before reaching vulnerable interface

🔍 How to Verify

Check if Vulnerable:

Attempt to access web interface without valid credentials. If access is granted, system is vulnerable.

Check Version:

Check firmware version via web interface or contact PDQ Manufacturing for version verification

Verify Fix Applied:

After update, attempt authentication bypass. Access should be denied without proper credentials.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Access from unexpected IP addresses
  • Configuration changes without authentication logs

Network Indicators:

  • HTTP requests to car wash controllers without authentication headers
  • Unusual traffic patterns to controller web ports

SIEM Query:

source_ip=* AND dest_port=(80,443,8080) AND http_user_agent contains 'car wash' AND NOT auth_success=true

🔗 References

📤 Share & Export