Refine your search

23 vulnerabilities found for by Xerox

CVE-2026-2252 (GCVE-0-2026-2252)
Vulnerability from cvelistv5
Published
2026-02-27 08:18
Modified
2026-03-06 15:34
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference
  • CWE-918 - Server-Side Request Forgery (SSRF)
Summary
An XML External Entity (XXE) vulnerability allows malicious user to perform Server-Side Request Forgery (SSRF) via crafted XML input containing malicious external entity references. This issue affects Xerox FreeFlow Core versions up to and including 8.0.7.  Please consider upgrading to FreeFlow Core version 8.1.0 via the software available on -  https://www.support.xerox.com/en-us/product/core/downloads
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-2252",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-03T19:27:58.048822Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-06T15:34:24.049Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThanOrEqual": "8.0.7",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An XML External Entity (XXE) vulnerability allows malicious user to perform Server-Side Request Forgery (SSRF) via crafted XML input containing malicious external entity references.\n\n\u003cp\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eThis issue affects Xerox FreeFlow Core versions up to and including 8.0.7.\u0026nbsp;\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003ePlease consider upgrading to FreeFlow Core version 8.1.0 via the software available on -\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.support.xerox.com/en-us/product/core/downloads\"\u003ehttps://www.support.xerox.com/en-us/product/core/downloads\u003c/a\u003e\u003c/span\u003e\n\n\u003c/p\u003e"
            }
          ],
          "value": "An XML External Entity (XXE) vulnerability allows malicious user to perform Server-Side Request Forgery (SSRF) via crafted XML input containing malicious external entity references.\n\nThis issue affects Xerox FreeFlow Core versions up to and including 8.0.7.\u00a0\n\nPlease consider upgrading to FreeFlow Core version 8.1.0 via the software available on -\u00a0 https://www.support.xerox.com/en-us/product/core/downloads"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-201",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-201 Serialized Data External Linking"
            }
          ]
        },
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "CWE-918 Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-27T08:18:38.491Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2026/02/Xerox-Security-Bulletin-026-005-for-Xerox-Freeflow-Core.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "XML External Entity (XXE) vulnerability resulting in Server-Side Request Forgery (SSRF)",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2026-2252",
    "datePublished": "2026-02-27T08:18:17.816Z",
    "dateReserved": "2026-02-09T14:29:08.541Z",
    "dateUpdated": "2026-03-06T15:34:24.049Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-2251 (GCVE-0-2026-2251)
Vulnerability from cvelistv5
Published
2026-02-27 08:08
Modified
2026-03-03 15:36
Severity ?
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Improper limitation of a pathname to a restricted directory (Path Traversal) vulnerability in Xerox FreeFlow Core allows unauthorized path traversal leading to RCE. This issue affects Xerox FreeFlow Core versions up to and including 8.0.7. Please consider upgrading to FreeFlow Core version 8.1.0 via the software available on - https://www.support.xerox.com/en-us/product/core/downloads https://www.support.xerox.com/en-us/product/core/downloads
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-2251",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-28T04:55:30.258511Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-03T15:36:53.126Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThanOrEqual": "8.0.7",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper limitation of a pathname to a restricted directory (\u003cstrong\u003ePath Traversal\u003c/strong\u003e) vulnerability in Xerox FreeFlow Core allows unauthorized path traversal leading to RCE. \u003cbr\u003eThis issue affects Xerox FreeFlow Core versions up to and including 8.0.7.\u003cbr\u003e\u003cbr\u003e\n\n\n\n\n\nPlease consider upgrading to FreeFlow Core version 8.1.0 via the software available on - \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.support.xerox.com/en-us/product/core/downloads\"\u003ehttps://www.support.xerox.com/en-us/product/core/downloads\u003c/a\u003e\n\n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.support.xerox.com/en-us/product/core/downloads?language=en\"\u003e\u003c/a\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "Improper limitation of a pathname to a restricted directory (Path Traversal) vulnerability in Xerox FreeFlow Core allows unauthorized path traversal leading to RCE. \nThis issue affects Xerox FreeFlow Core versions up to and including 8.0.7.\n\n\n\n\n\n\n\nPlease consider upgrading to FreeFlow Core version 8.1.0 via the software available on -  https://www.support.xerox.com/en-us/product/core/downloads \n\n  https://www.support.xerox.com/en-us/product/core/downloads"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        },
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-27T08:18:56.212Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2026/02/Xerox-Security-Bulletin-026-005-for-Xerox-Freeflow-Core.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Path Traversal leading to Remote Code Execution (RCE)",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2026-2251",
    "datePublished": "2026-02-27T08:08:52.263Z",
    "dateReserved": "2026-02-09T14:29:07.126Z",
    "dateUpdated": "2026-03-03T15:36:53.126Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-1769 (GCVE-0-2026-1769)
Vulnerability from cvelistv5
Published
2026-02-06 17:19
Modified
2026-02-06 18:42
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Xerox CentreWare on Windows allows Stored XSS.This issue affects CentreWare: through 7.0.6.  Consider upgrading Xerox® CentreWare Web® to v7.2.2.25 via the software available on Xerox.com
Impacted products
Vendor Product Version
Xerox CentreWare Version: 0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-1769",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-06T18:41:28.188769Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-06T18:42:12.895Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows"
          ],
          "product": "CentreWare",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThanOrEqual": "7.0.6",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2026-02-02T18:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Xerox CentreWare on Windows allows Stored XSS.\u003cp\u003eThis issue affects CentreWare: through 7.0.6.\u0026nbsp;\u003c/p\u003e\u003cp\u003eConsider \nupgrading Xerox\u00ae CentreWare Web\u00ae to v7.2.2.25 via the software available on Xerox.com\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027) vulnerability in Xerox CentreWare on Windows allows Stored XSS.This issue affects CentreWare: through 7.0.6.\u00a0\n\nConsider \nupgrading Xerox\u00ae CentreWare Web\u00ae to v7.2.2.25 via the software available on Xerox.com"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-06T17:20:16.984Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2026/02/Xerox-Security-Bulletin-XRX26-003-for-Xerox-CentreWare-Web.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Stored XSS on Xerox CentreWare Web 7.0.6",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2026-1769",
    "datePublished": "2026-02-06T17:19:45.450Z",
    "dateReserved": "2026-02-02T15:52:12.797Z",
    "dateUpdated": "2026-02-06T18:42:12.895Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-8356 (GCVE-0-2025-8356)
Vulnerability from cvelistv5
Published
2025-08-08 15:40
Modified
2026-02-26 17:49
Severity ?
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Summary
In Xerox FreeFlow Core version 8.0.4, an attacker can exploit a Path Traversal vulnerability to access unauthorized files on the server. This can lead to Remote Code Execution (RCE), allowing the attacker to run arbitrary commands on the system.
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 0   < 8.0.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8356",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-19T03:55:29.475333Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T17:49:46.284Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://horizon3.ai/attack-research/attack-blogs/from-support-ticket-to-zero-day/"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows"
          ],
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "8.0.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-08-08T15:40:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eIn Xerox FreeFlow Core version 8.0.4, an attacker can exploit a Path Traversal vulnerability to access unauthorized files on the server. This can lead to Remote Code Execution (RCE), allowing the attacker to run arbitrary commands on the system.\u003c/p\u003e"
            }
          ],
          "value": "In Xerox FreeFlow Core version 8.0.4, an attacker can exploit a Path Traversal vulnerability to access unauthorized files on the server. This can lead to Remote Code Execution (RCE), allowing the attacker to run arbitrary commands on the system."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        },
        {
          "capecId": "CAPEC-242",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-242 Code Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-08T15:42:40.647Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Path Traversal leading to RCE",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2025-8356",
    "datePublished": "2025-08-08T15:40:12.588Z",
    "dateReserved": "2025-07-30T13:54:05.676Z",
    "dateUpdated": "2026-02-26T17:49:46.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-8355 (GCVE-0-2025-8355)
Vulnerability from cvelistv5
Published
2025-08-08 15:31
Modified
2025-08-08 16:02
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference
Summary
In Xerox FreeFlow Core version 8.0.4, improper handling of XML input allows injection of external entities. An attacker can craft malicious XML containing references to internal URLs, this results in a Server-Side Request Forgery (SSRF).
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 0   < 8.0.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8355",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-08T16:02:33.856898Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-08T16:02:42.866Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows"
          ],
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "8.0.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-08-08T15:27:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In Xerox FreeFlow Core version 8.0.4, improper handling of XML input allows injection of external entities. An attacker can craft malicious XML containing references to internal URLs, this results in a Server-Side Request Forgery (SSRF)."
            }
          ],
          "value": "In Xerox FreeFlow Core version 8.0.4, improper handling of XML input allows injection of external entities. An attacker can craft malicious XML containing references to internal URLs, this results in a Server-Side Request Forgery (SSRF)."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-137",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-137 Parameter Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-08T15:43:07.165Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "XXE leading to SSRF",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2025-8355",
    "datePublished": "2025-08-08T15:31:44.554Z",
    "dateReserved": "2025-07-30T13:54:04.373Z",
    "dateUpdated": "2025-08-08T16:02:42.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-1984 (GCVE-0-2025-1984)
Vulnerability from cvelistv5
Published
2025-03-12 15:27
Modified
2025-05-12 15:37
CWE
  • CWE-428 - Unquoted Search Path or Element
Summary
Xerox Desktop Print Experience application contains a Local Privilege Escalation (LPE) vulnerability, which allows a low-privileged user to gain SYSTEM-level access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1984",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-12T15:35:59.119211Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-12T15:37:02.156Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Xerox\u00ae Desktop Print Experience",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "8.5",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-03-12T15:26:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Xerox Desktop Print Experience application contains a Local Privilege Escalation (LPE) vulnerability, which allows a low-privileged user to gain SYSTEM-level access."
            }
          ],
          "value": "Xerox Desktop Print Experience application contains a Local Privilege Escalation (LPE) vulnerability, which allows a low-privileged user to gain SYSTEM-level access."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-428",
              "description": "CWE-428 Unquoted Search Path or Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-14T17:09:21.768Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/03/Xerox-Security-Bulletin-XRX25-006-for-Xerox-Desktop-Print-Experience.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Local Privilege Escalation on Xerox\u00ae Desktop Print Experience\u00ae v8.5",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2025-1984",
    "datePublished": "2025-03-12T15:27:07.715Z",
    "dateReserved": "2025-03-05T13:42:27.759Z",
    "dateUpdated": "2025-05-12T15:37:02.156Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-12511 (GCVE-0-2024-12511)
Vulnerability from cvelistv5
Published
2025-02-03 19:23
Modified
2025-09-17 11:09
CWE
  • CWE-306 - Missing Authentication for Critical Function
  • CWE-522 - Insufficiently Protected Credentials
Summary
With address book access, SMB/FTP settings could be modified, redirecting scans and possibly capturing credentials. This requires enabled scan functions and printer access.
Impacted products
Vendor Product Version
Xerox Versalink B400 Version: 0   < 37.82.53
Create a notification for this product.
   Xerox Versalink B405 Version: 0   < 38.82.53
Create a notification for this product.
   Xerox Versalink C400 Version: 0   < 67.82.53
Create a notification for this product.
   Xerox Versalink C405 Version: 0   < 68.82.53
Create a notification for this product.
   Xerox Versalink B600/B610 Version: 0   < 32.82.53
Create a notification for this product.
   Xerox Versalink B605/B615 Version: 0   < 33.82.53
Create a notification for this product.
   Xerox Versalink C500/C600 Version: 0   < 61.82.53
Create a notification for this product.
   Xerox Versalink C505/C605 Version: 0   < 62.82.53
Create a notification for this product.
   Xerox Versalink C7000 Version: 0   < 56.75.53
Create a notification for this product.
   Xerox Versalink C7020/C7025/C7030 Version: 0   < 57.75.53
Create a notification for this product.
   Xerox Versalink B7025/B7030/B7035 Version: 0   < 58.75.53
Create a notification for this product.
   Xerox Versalink B7125/B7130/B7135 Version: 0   < 59.24.53
Create a notification for this product.
   Xerox Versalink C7120/C7125/C7130 Version: 0   < 69.24.53
Create a notification for this product.
   Xerox Versalink C8000/C9000 Version: 0   < 70.75.53
Create a notification for this product.
   Xerox Versalink C8000W Version: 0   < 72.75.53
Create a notification for this product.
   Xerox Phaser 6510 Version: 0   < 64.75.53
Create a notification for this product.
   Xerox WorkCentre 6515 Version: 0   < 65.75.53
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12511",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-03T20:18:28.894076Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-03T20:18:36.134Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B400",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "37.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B405",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "38.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C400",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "67.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C405",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "68.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B600/B610",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "32.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B605/B615",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "33.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C500/C600",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "61.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C505/C605",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "62.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C7000",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "56.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C7020/C7025/C7030",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "57.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B7025/B7030/B7035",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "58.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B7125/B7130/B7135",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "59.24.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C7120/C7125/C7130",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "69.24.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C8000/C9000",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "70.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C8000W",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "72.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Phaser 6510",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "64.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "WorkCentre 6515",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "65.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-02-03T18:44:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "With address book access, SMB/FTP settings could be modified, redirecting scans and possibly capturing credentials. This requires enabled scan functions and printer access."
            }
          ],
          "value": "With address book access, SMB/FTP settings could be modified, redirecting scans and possibly capturing credentials. This requires enabled scan functions and printer access."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-593",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-593: Session Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-522",
              "description": "CWE-522 Insufficiently Protected Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-17T11:09:16.202Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/02/Xerox-Security-Bulletin-XRX25-003-for-Xerox%C2%AE-for-VersaLinkPhaser-and-WorkCentre.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "SMB/FTP Address Book Scan Pass-back attack",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-12511",
    "datePublished": "2025-02-03T19:23:52.125Z",
    "dateReserved": "2024-12-11T13:24:57.952Z",
    "dateUpdated": "2025-09-17T11:09:16.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-12510 (GCVE-0-2024-12510)
Vulnerability from cvelistv5
Published
2025-02-03 18:52
Modified
2025-02-27 14:56
CWE
  • CWE-287 - Improper Authentication
Summary
If LDAP settings are accessed, authentication could be redirected to another server, potentially exposing credentials. This requires admin access and an active LDAP setup.
Impacted products
Vendor Product Version
Xerox Versalink B400 Version: 0   < 37.82.53
Create a notification for this product.
   Xerox Versalink B405 Version: 0   < 38.82.53
Create a notification for this product.
   Xerox Versalink C400 Version: 0   < 67.82.53
Create a notification for this product.
   Xerox Versalink C405 Version: 0   < 68.82.53
Create a notification for this product.
   Xerox Versalink B600/B610 Version: 0   < 32.82.53
Create a notification for this product.
   Xerox Versalink B605/B615 Version: 0   < 33.82.53
Create a notification for this product.
   Xerox Versalink C500/C600 Version: 0   < 61.82.53
Create a notification for this product.
   Xerox Versalink C505/C605 Version: 0   < 62.82.53
Create a notification for this product.
   Xerox Versalink C7000 Version: 0   < 56.75.53
Create a notification for this product.
   Xerox Versalink C7020/C7025/C7030 Version: 0   < 57.75.53
Create a notification for this product.
   Xerox Versalink B7025/B7030/B7035 Version: 0   < 58.75.53
Create a notification for this product.
   Xerox Versalink B7125/B7130/B7135 Version: 0   < 59.24.53
Create a notification for this product.
   Xerox Versalink C7120/C7125/C7130 Version: 0   < 69.24.53
Create a notification for this product.
   Xerox Versalink C8000/C9000 Version: 0   < 70.75.53
Create a notification for this product.
   Xerox Versalink C8000W Version: 0   < 72.75.53
Create a notification for this product.
   Xerox Phaser 6510 Version: 0   < 64.75.53
Create a notification for this product.
   Xerox WorkCentre 6515 Version: 0   < 65.75.53
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12510",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-12T19:37:44.752191Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T14:56:42.166Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B400",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "37.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B405",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "38.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C400",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "67.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C405",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "68.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B600/B610",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "32.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B605/B615",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "33.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C500/C600",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "61.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C505/C605",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "62.82.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C7000",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "56.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C7020/C7025/C7030",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "57.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B7025/B7030/B7035",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "58.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink B7125/B7130/B7135",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "59.24.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C7120/C7125/C7130",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "69.24.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C8000/C9000",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "70.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Versalink C8000W",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "72.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Phaser 6510",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "64.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "WorkCentre 6515",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "65.75.53",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-02-03T18:44:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "If LDAP settings are accessed, authentication could be redirected to another server, potentially exposing credentials. This requires admin access and an active LDAP setup."
            }
          ],
          "value": "If LDAP settings are accessed, authentication could be redirected to another server, potentially exposing credentials. This requires admin access and an active LDAP setup."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-136",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-136: LDAP Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287: Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-03T19:20:36.405Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/02/Xerox-Security-Bulletin-XRX25-003-for-Xerox%C2%AE-for-VersaLinkPhaser-and-WorkCentre.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "LDAP Authentication Sever Pass-back attack",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-12510",
    "datePublished": "2025-02-03T18:52:16.942Z",
    "dateReserved": "2024-12-11T13:24:56.453Z",
    "dateUpdated": "2025-02-27T14:56:42.166Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-55931 (GCVE-0-2024-55931)
Vulnerability from cvelistv5
Published
2025-01-27 11:28
Modified
2025-02-24 17:20
CWE
  • CWE-922 - Insecure Storage of Sensitive Information
Summary
Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user's session is compromised.  The patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin.
Impacted products
Vendor Product Version
Xerox Xerox Workplace Suite Version: 0   < 5.6.701.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-55931",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-27T13:26:58.343505Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-12T20:01:13.094Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Xerox Workplace Suite",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "5.6.701.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-23T18:22:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eXerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user\u0027s session is compromised.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThe patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin.\u003c/p\u003e"
            }
          ],
          "value": "Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user\u0027s session is compromised.\u00a0\n\nThe patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-102",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-102 Session Sidejacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-922",
              "description": "CWE-922 Insecure Storage of Sensitive Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-24T17:20:04.431Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Token stored in session storage",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-55931",
    "datePublished": "2025-01-27T11:28:45.510Z",
    "dateReserved": "2024-12-13T14:30:30.207Z",
    "dateUpdated": "2025-02-24T17:20:04.431Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-55930 (GCVE-0-2024-55930)
Vulnerability from cvelistv5
Published
2025-01-23 17:36
Modified
2025-02-24 17:18
CWE
  • CWE-276 - Incorrect Default Permissions
Summary
Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files
Impacted products
Vendor Product Version
Xerox Xerox Workplace Suite Version: 0   < 5.6.701.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-55930",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T19:02:22.198650Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T19:02:30.320Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Xerox Workplace Suite",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "5.6.701.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-23T17:33:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files"
            }
          ],
          "value": "Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-24T17:18:39.252Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Weak default folder permissions",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-55930",
    "datePublished": "2025-01-23T17:36:01.763Z",
    "dateReserved": "2024-12-13T14:30:30.207Z",
    "dateUpdated": "2025-02-24T17:18:39.252Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-55929 (GCVE-0-2024-55929)
Vulnerability from cvelistv5
Published
2025-01-23 17:30
Modified
2025-02-24 17:17
CWE
  • CWE-345 - Insufficient Verification of Data Authenticity
Summary
A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources.
Impacted products
Vendor Product Version
Xerox Xerox Workplace Suite Version: 0   < 5.6.701.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-55929",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T19:01:12.854666Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T19:01:20.686Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Xerox Workplace Suite",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "5.6.701.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-23T17:26:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources."
            }
          ],
          "value": "A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-151",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-151 Identity Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-345",
              "description": "CWE-345 Insufficient Verification of Data Authenticity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-24T17:17:09.394Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Mail spoofing",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-55929",
    "datePublished": "2025-01-23T17:30:34.224Z",
    "dateReserved": "2024-12-13T14:30:30.207Z",
    "dateUpdated": "2025-02-24T17:17:09.394Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-55928 (GCVE-0-2024-55928)
Vulnerability from cvelistv5
Published
2025-01-23 17:25
Modified
2025-02-24 17:16
CWE
  • CWE-312 - Cleartext Storage of Sensitive Information
Summary
Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption
Impacted products
Vendor Product Version
Xerox Xerox Workplace Suite Version: 0   < 5.6.701.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-55928",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T19:00:32.313469Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T19:00:57.806Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Xerox Workplace Suite",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "5.6.701.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-23T17:21:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption"
            }
          ],
          "value": "Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-37",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-37 Retrieve Embedded Sensitive Data"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-312",
              "description": "CWE-312 Cleartext Storage of Sensitive Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-24T17:16:19.462Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Clear text secrets returned \u0026 Remote system secrets in clear text",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-55928",
    "datePublished": "2025-01-23T17:25:46.915Z",
    "dateReserved": "2024-12-13T14:30:30.207Z",
    "dateUpdated": "2025-02-24T17:16:19.462Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-55927 (GCVE-0-2024-55927)
Vulnerability from cvelistv5
Published
2025-01-23 17:20
Modified
2025-02-24 17:12
CWE
  • CWE-798 - Use of Hard-coded Credentials
Summary
A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions.
Impacted products
Vendor Product Version
Xerox Xerox Workplace Suite Version: 0   < 5.6.701.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-55927",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T18:59:41.971362Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T18:59:54.756Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Xerox Workplace Suite",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "5.6.701.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-23T17:15:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions."
            }
          ],
          "value": "A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-633",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-633 Token Impersonation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-24T17:12:10.831Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Flawed token generation implementation \u0026 Hard-coded key implementation",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-55927",
    "datePublished": "2025-01-23T17:20:29.974Z",
    "dateReserved": "2024-12-13T14:30:30.207Z",
    "dateUpdated": "2025-02-24T17:12:10.831Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-55926 (GCVE-0-2024-55926)
Vulnerability from cvelistv5
Published
2025-01-23 17:12
Modified
2025-02-24 17:11
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data
Impacted products
Vendor Product Version
Xerox Xerox Workplace Suite Version: 0   < 5.6.701.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-55926",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T18:58:12.443714Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T18:58:27.492Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Xerox Workplace Suite",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "5.6.701.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-23T17:05:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data"
            }
          ],
          "value": "A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-165",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-165 File Manipulation"
            }
          ]
        },
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        },
        {
          "capecId": "CAPEC-78",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-78 Using Escaped Slashes in Alternate Encoding"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-24T17:11:02.567Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Arbitrary file upload, deletion and read through header manipulation",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-55926",
    "datePublished": "2025-01-23T17:12:21.371Z",
    "dateReserved": "2024-12-13T14:30:30.206Z",
    "dateUpdated": "2025-02-24T17:11:02.567Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-55925 (GCVE-0-2024-55925)
Vulnerability from cvelistv5
Published
2025-01-23 17:03
Modified
2025-09-17 16:49
CWE
  • CWE-290 - Authentication Bypass by Spoofing
Summary
In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints.
Impacted products
Vendor Product Version
Xerox Xerox Workplace Suite Version: 0   < 5.6.701.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-55925",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T18:56:52.411909Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T18:57:13.529Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "platforms": [
            "Windows"
          ],
          "product": "Xerox Workplace Suite",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "5.6.701.9",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-01-23T17:03:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the \u003ccode\u003eHost\u003c/code\u003e header. If the server improperly validates or trusts the \u003ccode\u003eHost\u003c/code\u003e header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints."
            }
          ],
          "value": "In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-33",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-33 HTTP Request Smuggling"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-290",
              "description": "CWE-290 Authentication Bypass by Spoofing",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-17T16:49:42.753Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "API Security bypass through header manipulation",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-55925",
    "datePublished": "2025-01-23T17:03:33.187Z",
    "dateReserved": "2024-12-13T14:30:30.206Z",
    "dateUpdated": "2025-09-17T16:49:42.753Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6333 (GCVE-0-2024-6333)
Vulnerability from cvelistv5
Published
2024-10-17 13:51
Modified
2025-09-17 16:52
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
Authenticated Remote Code Execution in Altalink, Versalink & WorkCentre Products.
Impacted products
Vendor Product Version
Xerox AltaLink® B8045 / B8055 / B8065 / B8075 / B8090 | C8030 / C8035 / C8045 / C8055 / C807 Version: 103.xxx.024.18600   <
Create a notification for this product.
   Xerox Xerox® EC8036 / EC8056 Version: 103.xxx.024.18600
Create a notification for this product.
   Xerox Xerox® EC8036 / EC8056 - Common Criteria (June 2022) Version: 103.023.031.35105
Create a notification for this product.
   Xerox Xerox® EC8036 / EC8056 - Common Criteria (June 2024) Version: 103.xxx.013.14115
Create a notification for this product.
   Xerox AltaLink®C8130 / C8135 / C8145 / C8155 / C8170 | B8145 / B8155 / B8170 Common Criteria (Aug 2024) Version: 119.xxx.023.13006
Create a notification for this product.
   Xerox AltaLink® C8130 / C8135 / C8145 / C8155 / C8170 | B8145 / B8155 / B8170 Common Criteria Certified (Aug 2023) Version: 111.xxx.003.11600
Create a notification for this product.
   Xerox VersaLink® B625 / C625 | B425 / C425 Common Criteria Certified (2024) Version: 119.xxx.003.11705
Create a notification for this product.
   Xerox WorkCentre 3655/3655i Version: 075.060.004.07810
Create a notification for this product.
   Xerox WorkCentre 5945/55i Version: 075.091.004.07810
Create a notification for this product.
   Xerox WorkCentre 6655/6655i Version: 075.110.004.07810
Create a notification for this product.
   Xerox WorkCentre 7220/7225i Version: 075.030.004.07810
Create a notification for this product.
   Xerox WorkCentre 7830/7835i Version: 075.010 004.07810
Create a notification for this product.
   Xerox WorkCentre 7845/7855i Version: 075.040.004.07810
Create a notification for this product.
   Xerox WorkCentre 7845/7855 (IBG) Version: 075.080.004.07810
Create a notification for this product.
   Xerox WorkCentre 7970/7970i Version: 075.200.004.07810
Create a notification for this product.
   Xerox WorkCentre EC7836 Version: 075.050.004.07810
Create a notification for this product.
   Xerox WorkCentre EC7856 Version: 075.020.004.07810
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:xerox:altalink_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "altalink_firmware",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "103.xxx.024.18600",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "119.xxx.023.13006",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "111.xxx.003.11600",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:xerox:versalink_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "versalink_firmware",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "119.xxx.003.11705",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:xerox:workcentre_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "workcentre_firmware",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "075.060.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.091.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.110.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.030.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.010 004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.040.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.080.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.200.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.050.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "075.020.004.07810",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:xerox:xerox_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xerox_firmware",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "103.xxx.024.18600",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "103.023.031.35105",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "103.xxx.013.14115",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6333",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-25T18:32:51.988456Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-25T19:19:55.218Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-10-29T05:02:50.054Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://seclists.org/fulldisclosure/2024/Oct/17"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "AltaLink\u00ae B8045 / B8055 / B8065 / B8075 / B8090 | C8030 / C8035 / C8045 / C8055 / C807",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "103.xxx.024.18600",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Xerox\u00ae EC8036 / EC8056",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "103.xxx.024.18600"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Xerox\u00ae EC8036 / EC8056 - Common Criteria (June 2022)",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "103.023.031.35105"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Xerox\u00ae EC8036 / EC8056 - Common Criteria (June 2024)",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "103.xxx.013.14115"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AltaLink\u00aeC8130 / C8135 / C8145 / C8155 / C8170 | B8145 / B8155 / B8170 Common Criteria (Aug 2024)",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "119.xxx.023.13006"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AltaLink\u00ae C8130 / C8135 / C8145 / C8155 / C8170 | B8145 / B8155 / B8170 Common Criteria Certified (Aug 2023)",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "111.xxx.003.11600"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VersaLink\u00ae B625 / C625 | B425 / C425 Common Criteria Certified (2024)",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "119.xxx.003.11705"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre 3655/3655i",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.060.004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre 5945/55i",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.091.004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre 6655/6655i",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.110.004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre 7220/7225i",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.030.004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre 7830/7835i",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.010 004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre 7845/7855i",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.040.004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre 7845/7855 (IBG)",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.080.004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre 7970/7970i",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.200.004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre EC7836",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.050.004.07810"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WorkCentre EC7856",
          "vendor": "Xerox",
          "versions": [
            {
              "status": "affected",
              "version": "075.020.004.07810"
            }
          ]
        }
      ],
      "datePublic": "2024-10-16T13:46:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Authenticated Remote Code Execution in Altalink, Versalink \u0026amp; WorkCentre Products."
            }
          ],
          "value": "Authenticated Remote Code Execution in Altalink, Versalink \u0026 WorkCentre Products."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-17T16:52:52.859Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/10/Xerox-Security-Bulletin-XRX24-015-for-Altalink-Versalink-and-WorkCentre-%E2%80%93-CVE-2024-6333-.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Authenticated Remote Code Execution in Altalink, Versalink \u0026 WorkCentre Products",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-6333",
    "datePublished": "2024-10-17T13:51:16.011Z",
    "dateReserved": "2024-06-25T18:31:05.065Z",
    "dateUpdated": "2025-09-17T16:52:52.859Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-47559 (GCVE-0-2024-47559)
Vulnerability from cvelistv5
Published
2024-10-07 18:21
Modified
2024-10-07 18:35
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Authenticated RCE via Path Traversal
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 7.0.x   < 7.0.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:xerox:freeflow_core:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "freeflow_core",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "7.0.11",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47559",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-07T18:35:27.802049Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-07T18:35:37.222Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "7.0.11",
              "status": "affected",
              "version": "7.0.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-10-01T17:43:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Authenticated RCE via Path Traversal"
            }
          ],
          "value": "Authenticated RCE via Path Traversal"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-07T18:21:39.723Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/10/Xerox-Security-Bulletin-XRX24-014-for-Xerox%C2%AE-FreeFlow%C2%AE-Core-v7.0-.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Authenticated RCE via Path Traversal",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-47559",
    "datePublished": "2024-10-07T18:21:39.723Z",
    "dateReserved": "2024-09-26T17:00:49.987Z",
    "dateUpdated": "2024-10-07T18:35:37.222Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-47558 (GCVE-0-2024-47558)
Vulnerability from cvelistv5
Published
2024-10-07 18:19
Modified
2024-10-07 18:35
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Authenticated RCE via Path Traversal
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 7.0.x   < 7.0.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:xerox:freeflow_core:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "freeflow_core",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "7.0.11",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47558",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-07T18:35:23.016402Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-07T18:35:46.142Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "7.0.11",
              "status": "affected",
              "version": "7.0.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-10-01T17:43:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Authenticated RCE via Path Traversal"
            }
          ],
          "value": "Authenticated RCE via Path Traversal"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-07T18:19:52.030Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/10/Xerox-Security-Bulletin-XRX24-014-for-Xerox%C2%AE-FreeFlow%C2%AE-Core-v7.0-.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Authenticated RCE via Path Traversal",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-47558",
    "datePublished": "2024-10-07T18:19:52.030Z",
    "dateReserved": "2024-09-26T17:00:49.987Z",
    "dateUpdated": "2024-10-07T18:35:46.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-47557 (GCVE-0-2024-47557)
Vulnerability from cvelistv5
Published
2024-10-07 18:17
Modified
2024-10-07 18:35
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Pre-Auth RCE via Path Traversal
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 7.0.x   < 7.0.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:xerox:freeflow_core:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "freeflow_core",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "7.0.11",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47557",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-07T18:35:05.430466Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-07T18:35:52.793Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "7.0.11",
              "status": "affected",
              "version": "7.0.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-10-01T17:43:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Pre-Auth RCE via Path Traversal"
            }
          ],
          "value": "Pre-Auth RCE via Path Traversal"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-07T18:17:54.820Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/10/Xerox-Security-Bulletin-XRX24-014-for-Xerox%C2%AE-FreeFlow%C2%AE-Core-v7.0-.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Pre-Auth RCE via Path Traversal",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-47557",
    "datePublished": "2024-10-07T18:17:54.820Z",
    "dateReserved": "2024-09-26T17:00:49.987Z",
    "dateUpdated": "2024-10-07T18:35:52.793Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-47556 (GCVE-0-2024-47556)
Vulnerability from cvelistv5
Published
2024-10-07 18:14
Modified
2024-10-07 18:36
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Pre-Auth RCE via Path Traversal
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 7.0.x   < 7.0.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:xerox:freeflow_core:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "freeflow_core",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "7.0.11",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47556",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-07T18:35:00.275758Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-07T18:36:00.696Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "7.0.11",
              "status": "affected",
              "version": "7.0.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-10-01T17:43:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Pre-Auth RCE via Path Traversal"
            }
          ],
          "value": "Pre-Auth RCE via Path Traversal"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-07T18:14:08.147Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/10/Xerox-Security-Bulletin-XRX24-014-for-Xerox%C2%AE-FreeFlow%C2%AE-Core-v7.0-.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Pre-Auth RCE via Path Traversal",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-47556",
    "datePublished": "2024-10-07T18:14:08.147Z",
    "dateReserved": "2024-09-26T17:00:49.987Z",
    "dateUpdated": "2024-10-07T18:36:00.696Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-47555 (GCVE-0-2024-47555)
Vulnerability from cvelistv5
Published
2024-10-07 17:43
Modified
2024-10-07 18:34
CWE
  • CWE-306 - Missing Authentication for Critical Function
Summary
Missing Authentication - User & System Configuration
Impacted products
Vendor Product Version
Xerox FreeFlow Core Version: 7.0.x   < 7.0.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:xerox:freeflow_core:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "freeflow_core",
            "vendor": "xerox",
            "versions": [
              {
                "lessThan": "7.0.11",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47555",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-07T18:34:24.628460Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-07T18:34:28.107Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FreeFlow Core",
          "vendor": "Xerox",
          "versions": [
            {
              "lessThan": "7.0.11",
              "status": "affected",
              "version": "7.0.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-10-01T17:43:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Missing Authentication - User \u0026amp; System Configuration"
            }
          ],
          "value": "Missing Authentication - User \u0026 System Configuration"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-07T17:43:38.811Z",
        "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
        "shortName": "Xerox"
      },
      "references": [
        {
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/10/Xerox-Security-Bulletin-XRX24-014-for-Xerox%C2%AE-FreeFlow%C2%AE-Core-v7.0-.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Missing Authentication - User \u0026 System Configuration",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f",
    "assignerShortName": "Xerox",
    "cveId": "CVE-2024-47555",
    "datePublished": "2024-10-07T17:43:38.811Z",
    "dateReserved": "2024-09-26T17:00:49.986Z",
    "dateUpdated": "2024-10-07T18:34:28.107Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-10881 (GCVE-0-2019-10881)
Vulnerability from cvelistv5
Published
2021-04-13 20:58
Modified
2024-08-04 22:32
Severity ?
CWE
  • CWE-259 - Use of Hard-coded Password
Summary
Xerox AltaLink B8045/B8055/B8065/B8075/B8090, AltaLink C8030/C8035/C8045/C8055/C8070 with software releases before 103.xxx.030.32000 includes two accounts with weak hard-coded passwords which can be exploited and allow unauthorized access which cannot be disabled.
References
Impacted products
Vendor Product Version
XEROX AltaLink B8045/B8055/B8065/B8075/B8090 Version: n/a
Create a notification for this product.
   XEROX AltaLink C8030/C8035/C8045/C8055/C8070 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 3655 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 5845/5855/5865/5875/5890 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 5945/5955 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 6655 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 7220/7225 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 7830/7835/7845/7855 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 7970 Version: n/a
Create a notification for this product.
   XEROX WorkCentre EC7836/EC7856 Version: n/a
Create a notification for this product.
   XEROX ColorQube 9301/9302/9303 Version: n/a
Create a notification for this product.
   XEROX ColorQube 8700/8900 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 6400 Version: n/a
Create a notification for this product.
   XEROX Phaser 6700 Version: n/a
Create a notification for this product.
   XEROX Phaser 7800 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 5735/5740/5745/5755/5765/5775/5790 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 7525/7530/7535/7545/7556 Version: n/a
Create a notification for this product.
   XEROX WorkCentre 7755/7765/7775 Version: n/a
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:32:02.132Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://airbus-seclab.github.io/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AltaLink B8045/B8055/B8065/B8075/B8090",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "AltaLink C8030/C8035/C8045/C8055/C8070",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 3655",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 5845/5855/5865/5875/5890",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 5945/5955",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 6655",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 7220/7225",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 7830/7835/7845/7855",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 7970",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre EC7836/EC7856",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "ColorQube 9301/9302/9303",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "ColorQube 8700/8900",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 6400",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "Phaser 6700",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "Phaser 7800",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 5735/5740/5745/5755/5765/5775/5790",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 7525/7530/7535/7545/7556",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        },
        {
          "product": "WorkCentre 7755/7765/7775",
          "vendor": "XEROX",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Rapha\u00ebl Rigo from the Airbus Security Lab"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Xerox AltaLink B8045/B8055/B8065/B8075/B8090, AltaLink C8030/C8035/C8045/C8055/C8070 with software releases before 103.xxx.030.32000 includes two accounts with weak hard-coded passwords which can be exploited and allow unauthorized access which cannot be disabled."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-259",
              "description": "CWE-259 Use of Hard-coded Password",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-13T20:58:01.000Z",
        "orgId": "24a3c815-5f22-4d74-967a-30958d6466f4",
        "shortName": "airbus"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://airbus-seclab.github.io/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "No fix available for now."
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Default hidden Privileged Account Vulnerability in multiple XEROX devices",
      "workarounds": [
        {
          "lang": "en",
          "value": "There no known workaround for now available."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.6"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@airbus.com",
          "ID": "CVE-2019-10881",
          "STATE": "PUBLIC",
          "TITLE": "Default hidden Privileged Account Vulnerability in multiple XEROX devices"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AltaLink B8045/B8055/B8065/B8075/B8090",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AltaLink C8030/C8035/C8045/C8055/C8070",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 3655",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 5845/5855/5865/5875/5890",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 5945/5955",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 6655",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7220/7225",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7830/7835/7845/7855",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7970",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre EC7836/EC7856",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ColorQube 9301/9302/9303",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ColorQube 8700/8900",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 6400",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Phaser 6700",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Phaser 7800",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 5735/5740/5745/5755/5765/5775/5790",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7525/7530/7535/7545/7556",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7755/7765/7775",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "XEROX"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Rapha\u00ebl Rigo from the Airbus Security Lab"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Xerox AltaLink B8045/B8055/B8065/B8075/B8090, AltaLink C8030/C8035/C8045/C8055/C8070 with software releases before 103.xxx.030.32000 includes two accounts with weak hard-coded passwords which can be exploited and allow unauthorized access which cannot be disabled."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.6"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-259 Use of Hard-coded Password"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://airbus-seclab.github.io/",
              "refsource": "MISC",
              "url": "https://airbus-seclab.github.io/"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "No fix available for now."
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "There no known workaround for now available."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "24a3c815-5f22-4d74-967a-30958d6466f4",
    "assignerShortName": "airbus",
    "cveId": "CVE-2019-10881",
    "datePublished": "2021-04-13T20:58:01.000Z",
    "dateReserved": "2019-04-05T00:00:00.000Z",
    "dateUpdated": "2024-08-04T22:32:02.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-10880 (GCVE-0-2019-10880)
Vulnerability from cvelistv5
Published
2019-04-12 17:37
Modified
2024-08-04 22:32
Severity ?
CWE
  • CWE-78 - OS Command Injection
Summary
Within multiple XEROX products a vulnerability allows remote command execution on the Linux system, as the "nobody" user through a crafted "HTTP" request (OS Command Injection vulnerability in the HTTP interface). Depending upon configuration authentication may not be necessary.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:32:02.151Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://airbus-seclab.github.io/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2019/04/cert_Security_Mini_Bulletin_XRX19C_for_CQ8700_CQ8900_CQ93xx.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AltaLink B8045/B8055/B8065/B8075/B8090",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "101.008.008.27400",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "AltaLink C8030/C8035/C8045/C8055/C8070",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "101.001.008.27400",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 3655",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "073.060.075.34540",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 5845/5855/5865/5875/5890",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "073.190.075.34540",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 5945/5955",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "073.091.075.34540",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 6655",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "073.110.075.34540",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 7220/7225",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "073.030.075.34540",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 7830/7835/7845/7855",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "073.010.075.34540",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 7970",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "073.200.075.34540",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre EC7836/EC7856",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "073.020.167.17200",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ColorQube 9301/9302/9303",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThan": "072.xxx.009.07200",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ColorQube 8700/8900",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThan": "072.xxx.009.07200",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 6400",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "061.070.100.24201",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Phaser 6700",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "081.140.103.22600",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Phaser 7800",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "081.150.103.05600",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 5735/5740/5745/5755/5765/5775/5790",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "061.132.221.21403",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 7525/7530/7535/7545/7556",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "061.121.224.18803",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WorkCentre 7755/7765/7775",
          "vendor": "XEROX",
          "versions": [
            {
              "lessThanOrEqual": "061.090.220.19700",
              "status": "unknown",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Rapha\u00c3\u00abl Rigo from the Airbus Security Lab"
        }
      ],
      "datePublic": "2019-02-25T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Within multiple XEROX products a vulnerability allows remote command execution on the Linux system, as the \"nobody\" user through a crafted \"HTTP\" request (OS Command Injection vulnerability in the HTTP interface). Depending upon configuration authentication may not be necessary."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 OS Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-04-12T17:37:54.000Z",
        "orgId": "24a3c815-5f22-4d74-967a-30958d6466f4",
        "shortName": "airbus"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://airbus-seclab.github.io/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2019/04/cert_Security_Mini_Bulletin_XRX19C_for_CQ8700_CQ8900_CQ93xx.pdf"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "A fix for some models is available."
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "workarounds": [
        {
          "lang": "en",
          "value": "There are no known workarounds for now available."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.6"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@airbus.com",
          "ID": "CVE-2019-10880",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AltaLink B8045/B8055/B8065/B8075/B8090",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "101.008.008.27400"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "AltaLink C8030/C8035/C8045/C8055/C8070",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "101.001.008.27400"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 3655",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "073.060.075.34540"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 5845/5855/5865/5875/5890",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "073.190.075.34540"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 5945/5955",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "073.091.075.34540"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 6655",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "073.110.075.34540"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7220/7225",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "073.030.075.34540"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7830/7835/7845/7855",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "073.010.075.34540"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7970",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "073.200.075.34540"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre EC7836/EC7856",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "073.020.167.17200"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ColorQube 9301/9302/9303",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "072.xxx.009.07200"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ColorQube 8700/8900",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "072.xxx.009.07200"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 6400",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "061.070.100.24201"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Phaser 6700",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "081.140.103.22600"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Phaser 7800",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "081.150.103.05600"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 5735/5740/5745/5755/5765/5775/5790",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "061.132.221.21403"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7525/7530/7535/7545/7556",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "061.121.224.18803"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WorkCentre 7755/7765/7775",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "?\u003c=",
                            "version_value": "061.090.220.19700"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "XEROX"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Rapha\u00c3\u00abl Rigo from the Airbus Security Lab"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Within multiple XEROX products a vulnerability allows remote command execution on the Linux system, as the \"nobody\" user through a crafted \"HTTP\" request (OS Command Injection vulnerability in the HTTP interface). Depending upon configuration authentication may not be necessary."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.6"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78 OS Command Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://airbus-seclab.github.io/",
              "refsource": "MISC",
              "url": "https://airbus-seclab.github.io/"
            },
            {
              "name": "https://securitydocs.business.xerox.com/wp-content/uploads/2019/04/cert_Security_Mini_Bulletin_XRX19C_for_CQ8700_CQ8900_CQ93xx.pdf",
              "refsource": "CONFIRM",
              "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2019/04/cert_Security_Mini_Bulletin_XRX19C_for_CQ8700_CQ8900_CQ93xx.pdf"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "A fix for some models is available."
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "There are no known workarounds for now available."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "24a3c815-5f22-4d74-967a-30958d6466f4",
    "assignerShortName": "airbus",
    "cveId": "CVE-2019-10880",
    "datePublished": "2019-04-12T17:37:54.000Z",
    "dateReserved": "2019-04-05T00:00:00.000Z",
    "dateUpdated": "2024-08-04T22:32:02.151Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}