TROYANOSYVIRUS
Volver a CVEs

CVE-2016-11061

CRITICAL
9.8

Descripcion

Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, and 7970i devices before 073.xxx.086.15410 do not properly escape parameters in the support/remoteUI/configrui.php script, which can allow an unauthenticated attacker to execute OS commands on the device.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado4/29/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

xerox:workcentre_3655xerox:workcentre_3655_firmwarexerox:workcentre_3655ixerox:workcentre_3655i_firmwarexerox:workcentre_5865xerox:workcentre_5865_firmwarexerox:workcentre_5865ixerox:workcentre_5865i_firmwarexerox:workcentre_5875xerox:workcentre_5875_firmwarexerox:workcentre_5875ixerox:workcentre_5875i_firmwarexerox:workcentre_5890xerox:workcentre_5890_firmwarexerox:workcentre_5890ixerox:workcentre_5890i_firmwarexerox:workcentre_5945xerox:workcentre_5945_firmwarexerox:workcentre_5945ixerox:workcentre_5945i_firmwarexerox:workcentre_5955xerox:workcentre_5955_firmwarexerox:workcentre_5955ixerox:workcentre_5955i_firmwarexerox:workcentre_6655xerox:workcentre_6655_firmwarexerox:workcentre_6655ixerox:workcentre_6655i_firmwarexerox:workcentre_7200xerox:workcentre_7200_firmwarexerox:workcentre_7200ixerox:workcentre_7200i_firmwarexerox:workcentre_7220xerox:workcentre_7220_firmwarexerox:workcentre_7225xerox:workcentre_7225_firmwarexerox:workcentre_7225ixerox:workcentre_7225i_firmwarexerox:workcentre_7830xerox:workcentre_7830_firmwarexerox:workcentre_7835xerox:workcentre_7835_firmwarexerox:workcentre_7845xerox:workcentre_7845_firmwarexerox:workcentre_7855xerox:workcentre_7855_firmwarexerox:workcentre_7970xerox:workcentre_7970_firmwarexerox:workcentre_7970ixerox:workcentre_7970i_firmware

Debilidades (CWE)

CWE-78

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.