Show filters
133 Total Results
Displaying 41-50 of 133
Sort by:
Attacker Value
Unknown

CVE-2019-13168

Disclosure Date: March 13, 2020 (last updated February 21, 2025)
Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by a buffer overflow vulnerability in the attributes parser of the IPP service. This would allow an unauthenticated attacker to cause a Denial of Service (DoS) and potentially execute arbitrary code on the device.
Attacker Value
Unknown

CVE-2019-13165

Disclosure Date: March 13, 2020 (last updated February 21, 2025)
Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by a buffer overflow vulnerability in the request parser of the IPP service. This would allow an unauthenticated attacker to cause a Denial of Service (DoS) and potentially execute arbitrary code on the device.
Attacker Value
Unknown

CVE-2019-13170

Disclosure Date: March 13, 2020 (last updated February 21, 2025)
Some Xerox printers (such as the Phaser 3320 V53.006.16.000) did not implement any mechanism to avoid CSRF attacks. Successful exploitation of this vulnerability can lead to the takeover of a local account on the device.
Attacker Value
Unknown

CVE-2019-13172

Disclosure Date: March 13, 2020 (last updated February 21, 2025)
Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by a buffer overflow vulnerability in the Authentication Cookie of the web application that would allow an attacker to execute arbitrary code on the device.
Attacker Value
Unknown

CVE-2020-9330

Disclosure Date: February 21, 2020 (last updated February 21, 2025)
Certain Xerox WorkCentre printers before 073.xxx.000.02300 do not require the user to reenter or validate LDAP bind credentials when changing the LDAP connector IP address. A malicious actor who gains access to affected devices (e.g., by using default credentials) can change the LDAP connection IP address to a system owned by the actor without knowledge of the LDAP bind credentials. After changing the LDAP connection IP address, subsequent authentication attempts will result in the printer sending plaintext LDAP (Active Directory) credentials to the actor. Although the credentials may belong to a non-privileged user, organizations frequently use privileged service accounts to bind to Active Directory. The attacker gains a foothold on the Active Directory domain at a minimum, and may use the credentials to take over control of the Active Directory domain. This affects 3655*, 3655i*, 58XX*, 58XXi*, 59XX*, 59XXi*, 6655**, 6655i**, 72XX*, 72XXi*, 78XX**, 78XXi**, 7970**, 7970i**, EC7836**…
Attacker Value
Unknown

CVE-2013-6362

Disclosure Date: February 13, 2020 (last updated February 21, 2025)
Xerox ColorCube and WorkCenter devices in 2013 had hardcoded FTP and shell user accounts.
Attacker Value
Unknown

CVE-2020-5526

Disclosure Date: January 31, 2020 (last updated February 21, 2025)
The AWMS Mobile App for Android 2.0.0 to 2.0.5 and for iOS 2.0.0 to 2.0.8 does not verify X.509 certificates from servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Attacker Value
Unknown

CVE-2020-5520

Disclosure Date: January 27, 2020 (last updated February 21, 2025)
The netprint App for iOS 3.2.3 and earlier does not verify X.509 certificates from servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Attacker Value
Unknown

CVE-2020-5522

Disclosure Date: January 27, 2020 (last updated February 21, 2025)
The kantan netprint App for Android 2.0.3 and earlier does not verify X.509 certificates from servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Attacker Value
Unknown

CVE-2020-5521

Disclosure Date: January 27, 2020 (last updated February 21, 2025)
The kantan netprint App for iOS 2.0.2 and earlier does not verify X.509 certificates from servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.