TROYANOSYVIRUS
Voltar para CVEs

CVE-2016-11061

CRITICAL
9.8

Descricao

Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, and 7970i devices before 073.xxx.086.15410 do not properly escape parameters in the support/remoteUI/configrui.php script, which can allow an unauthenticated attacker to execute OS commands on the device.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/29/2020
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0

Produtos afetados

xerox:workcentre_3655xerox:workcentre_3655_firmwarexerox:workcentre_3655ixerox:workcentre_3655i_firmwarexerox:workcentre_5865xerox:workcentre_5865_firmwarexerox:workcentre_5865ixerox:workcentre_5865i_firmwarexerox:workcentre_5875xerox:workcentre_5875_firmwarexerox:workcentre_5875ixerox:workcentre_5875i_firmwarexerox:workcentre_5890xerox:workcentre_5890_firmwarexerox:workcentre_5890ixerox:workcentre_5890i_firmwarexerox:workcentre_5945xerox:workcentre_5945_firmwarexerox:workcentre_5945ixerox:workcentre_5945i_firmwarexerox:workcentre_5955xerox:workcentre_5955_firmwarexerox:workcentre_5955ixerox:workcentre_5955i_firmwarexerox:workcentre_6655xerox:workcentre_6655_firmwarexerox:workcentre_6655ixerox:workcentre_6655i_firmwarexerox:workcentre_7200xerox:workcentre_7200_firmwarexerox:workcentre_7200ixerox:workcentre_7200i_firmwarexerox:workcentre_7220xerox:workcentre_7220_firmwarexerox:workcentre_7225xerox:workcentre_7225_firmwarexerox:workcentre_7225ixerox:workcentre_7225i_firmwarexerox:workcentre_7830xerox:workcentre_7830_firmwarexerox:workcentre_7835xerox:workcentre_7835_firmwarexerox:workcentre_7845xerox:workcentre_7845_firmwarexerox:workcentre_7855xerox:workcentre_7855_firmwarexerox:workcentre_7970xerox:workcentre_7970_firmwarexerox:workcentre_7970ixerox:workcentre_7970i_firmware

Fraquezas (CWE)

CWE-78

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.