mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
243 lines
9.2 KiB
JSON
243 lines
9.2 KiB
JSON
{
|
|
"id": "CVE-2022-23968",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-01-26T06:15:06.843",
|
|
"lastModified": "2024-11-21T06:49:32.480",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Xerox VersaLink devices on specific versions of firmware before 2022-01-26 allow remote attackers to brick the device via a crafted TIFF file in an unauthenticated HTTP POST request. There is a permanent denial of service because image parsing causes a reboot, but image parsing is restarted as soon as the boot process finishes. However, this boot loop can be resolved by a field technician. The TIFF file must have an incomplete Image Directory. Affected firmware versions include xx.42.01 and xx.50.61. NOTE: the 2022-01-24 NeoSmart article included \"believed to affect all previous and later versions as of the date of this posting\" but a 2022-01-26 vendor statement reports \"the latest versions of firmware are not vulnerable to this issue.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los dispositivos Xerox VersaLink versiones hasta el 24-01-2022 permiten a atacantes remotos bloquear el dispositivo por medio de un archivo TIFF dise\u00f1ado en una petici\u00f3n HTTP POST no autenticada. Se presenta una denegaci\u00f3n de servicio permanente porque el an\u00e1lisis de im\u00e1genes causa un reinicio, pero el an\u00e1lisis de im\u00e1genes es reiniciado tan pronto como termina el proceso de arranque. Sin embargo, este bucle de arranque puede ser resuelto por un t\u00e9cnico de campo. El archivo TIFF debe tener un directorio de im\u00e1genes incompleto. Las versiones de firmware afectadas son xx.42.01 y xx.50.61"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"baseScore": 7.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-835"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:xerox:versalink_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "42.01",
|
|
"matchCriteriaId": "0DC96F0E-C543-4E21-8C17-D45E3253F67D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:xerox:versalink_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "50.00",
|
|
"versionEndIncluding": "50.61",
|
|
"matchCriteriaId": "3BD42729-E413-4251-9D48-149262FD345A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F6371B2E-7D30-4EE1-BA02-C80BAD217C80"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5919C7E6-3005-4737-AAD3-A6531C605DC5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2C631EF-0AA0-4D06-868D-099862B5550A"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1980B9F3-19AB-4815-8452-AE42821263ED"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE6EA77E-C999-462B-9605-878940771608"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9FB9A38-795D-4D74-A1E9-CEBAC7502D1C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE9FF2BE-5998-4795-8237-9111D47B7C18"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0332FC06-B7B4-49CB-BACC-DEF2A8EEE0F7"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D7B6C70-5272-47B2-BC5F-B1F9DFCA7C42"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "053A2DDD-5314-455D-8793-ADA8CEEDF7F7"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43A83540-B071-4EE3-A98D-1BEE3C8FD3E5"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4DCD5A6F-DF0C-4C82-88BA-7CC5FE1EED2C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73BF6B1C-15E4-4C01-A571-1E6FB737ECAA"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3A937272-E36B-420D-8407-D44C78ACEC65"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2112B6B-C983-4323-AAE5-364272C2C070"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3812A4B0-D2DA-4180-9AC8-FF547A501C0C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BBD3D52F-B865-4217-8CF0-ACEABDB68378"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EE1A0557-4A74-45F7-8B98-447454BF8A58"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c8000w:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "955EEB44-F267-4463-A7D0-462664EC0C85"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4297DF3C-E132-4300-B891-9732EE003C3D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://twitter.com/mqudsi/status/1485756915187695618",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://twitter.com/mqudsi/status/1485756915187695618",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |