René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

120 lines
3.6 KiB
JSON

{
"id": "CVE-2018-18006",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-12-14T15:29:00.623",
"lastModified": "2019-01-03T14:11:07.357",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files."
},
{
"lang": "es",
"value": "Las credenciales embebidas para la aplicaci\u00f3n Ricoh myPrint, en versiones 2.9.2.4 para Windows y en versiones 2.2.7 para Android, otorga acceso a cualquier API WSDL de myPrint, tal y como queda demostrado con el descubrimiento de secretos de la API de impresoras Google en la nube, contrase\u00f1as cifradas de los servidores mail y los nombres de los archivos impresos."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ricoh:myprint:2.2.7:*:*:*:*:android:*:*",
"matchCriteriaId": "A17D9A19-40FF-4BB1-9C26-F14BC9DC8F68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ricoh:myprint:2.9.2.4:*:*:*:*:windows:*:*",
"matchCriteriaId": "CB2A4EBB-E592-4547-B16B-841D9D8DA63D"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2018/Nov/46",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
}
]
}