TROYANOSYVIRUS
Retour aux CVEs

CVE-2016-11061

CRITICAL
9.8

Description

Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, and 7970i devices before 073.xxx.086.15410 do not properly escape parameters in the support/remoteUI/configrui.php script, which can allow an unauthenticated attacker to execute OS commands on the device.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie4/29/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

xerox:workcentre_3655xerox:workcentre_3655_firmwarexerox:workcentre_3655ixerox:workcentre_3655i_firmwarexerox:workcentre_5865xerox:workcentre_5865_firmwarexerox:workcentre_5865ixerox:workcentre_5865i_firmwarexerox:workcentre_5875xerox:workcentre_5875_firmwarexerox:workcentre_5875ixerox:workcentre_5875i_firmwarexerox:workcentre_5890xerox:workcentre_5890_firmwarexerox:workcentre_5890ixerox:workcentre_5890i_firmwarexerox:workcentre_5945xerox:workcentre_5945_firmwarexerox:workcentre_5945ixerox:workcentre_5945i_firmwarexerox:workcentre_5955xerox:workcentre_5955_firmwarexerox:workcentre_5955ixerox:workcentre_5955i_firmwarexerox:workcentre_6655xerox:workcentre_6655_firmwarexerox:workcentre_6655ixerox:workcentre_6655i_firmwarexerox:workcentre_7200xerox:workcentre_7200_firmwarexerox:workcentre_7200ixerox:workcentre_7200i_firmwarexerox:workcentre_7220xerox:workcentre_7220_firmwarexerox:workcentre_7225xerox:workcentre_7225_firmwarexerox:workcentre_7225ixerox:workcentre_7225i_firmwarexerox:workcentre_7830xerox:workcentre_7830_firmwarexerox:workcentre_7835xerox:workcentre_7835_firmwarexerox:workcentre_7845xerox:workcentre_7845_firmwarexerox:workcentre_7855xerox:workcentre_7855_firmwarexerox:workcentre_7970xerox:workcentre_7970_firmwarexerox:workcentre_7970ixerox:workcentre_7970i_firmware

Faiblesses (CWE)

CWE-78

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.