8 results (0.015 seconds)

CVSS: 7.4EPSS: 0%CPEs: 90EXPL: 0

Konica Minolta bizhub MFP devices before 2022-04-14 allow a Sandbox Escape. An attacker must attach a keyboard to a USB port, press F12, and then escape from the kiosk mode. Los dispositivos bizhub MFP de Konica Minolta versiones anteriores a 14-04-2022, permiten un Escape de Sandbox. Un atacante debe conectar un teclado a un puerto USB, presionar F12 y luego escapar del modo kiosco Multiple Konica Minolta bizhub MFP printer terminals suffer from a sandbox escape with root access and have clear-text password vulnerabilities. • https://sec-consult.com/vulnerability-lab https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals •

CVSS: 4.7EPSS: 0%CPEs: 90EXPL: 1

Konica Minolta bizhub MFP devices before 2022-04-14 have an internal Chromium browser that executes with root (aka superuser) access privileges. Los dispositivos bizhub MFP de Konica Minolta versiones anteriores a 14-04-2022, presentan un navegador interno Chromium que es ejecutado con privilegios de acceso root (también se conoce como super usuario) Multiple Konica Minolta bizhub MFP printer terminals suffer from a sandbox escape with root access and have clear-text password vulnerabilities. • https://sec-consult.com/vulnerability-lab https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals • CWE-269: Improper Privilege Management •

CVSS: 7.5EPSS: 0%CPEs: 90EXPL: 0

Konica Minolta bizhub MFP devices before 2022-04-14 use cleartext password storage for the /var/log/nginx/html/ADMINPASS and /etc/shadow files. Los dispositivos bizhub MFP de Konica Minolta versiones anteriores a 14-04-2022, usan el almacenamiento de contraseñas en texto sin cifrar para los archivos /var/log/nginx/html/ADMINPASS y /etc/shadow Multiple Konica Minolta bizhub MFP printer terminals suffer from a sandbox escape with root access and have clear-text password vulnerabilities. • http://packetstormsecurity.com/files/167166/Konica-Minolta-bizhub-MFP-Printer-Terminal-Sandbox-Escape.html https://sec-consult.com/vulnerability-lab • CWE-522: Insufficiently Protected Credentials •

CVSS: 6.8EPSS: 0%CPEs: 104EXPL: 0

Protection mechanism failure vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, bizhub 4752/4052 GC9-X4 and earlier) allows a physical attacker to bypass the firmware integrity verification and to install malicious firmware. Una vulnerabilidad del mecanismo de protección en la serie bizhub de KONICA MINOLTA (bizhub versiones C750i G00-35 y anteriores, bizhub versiones C650i/C550i/C450i G00-B6 y anteriores, bizhub versiones C360i/C300i/C250i G00-B6 y anteriores, bizhub versiones 750i/650i/550i/450i G00-37 y anteriores, bizhub versiones 360i/300i G00-33 y anteriores, bizhub versiones C287i/C257i/C227i G00-19 y anteriores, bizhub versiones 306i/266i/246i/226i G00-B6 y anteriores, bizhub versiones C759/C659 GC7-X8 y anteriores, bizhub versiones C658/C558/C458 GC7-X8 y anteriores, bizhub versiones 958/808/758 GC7-X8 y anteriores, bizhub versiones 658e/558e/458e GC7-X8 y anteriores, bizhub versiones C287/C227 GC7-X8 y anteriores, bizhub versiones 287/227 GC7-X8 y anteriores, bizhub versiones 368e/308e GC7-X8 y anteriores, bizhub versiones C368/C308/C258 GC9-X4 y anteriores, bizhub versiones 558/458/368/308 GC9-X4 y anteriores, bizhub versiones C754e/C654e GDQ-M0 y anteriores, bizhub versiones 754e/654e GDQ-M0 y anteriores, bizhub versiones C554e/C454e GDQ-M1 y anteriores, bizhub versiones C364e/C284e/C224e GDQ-M1 y anteriores, bizhub versiones 554e/454e/364e/284e/224e GDQ-M1 y anteriores, bizhub versiones C754/C654 C554/C454 GR1-M0 y anteriores, bizhub versiones C364/C284/C224 GR1-M0 y anteriores, bizhub versiones 754/654 GR1-M0 y anteriores, bizhub versiones C3851FS/C3851/C3351 GC9-X4 y anteriores, bizhub versiones 4752/4052 GC9-X4 y anteriores) permite a un atacante físico omitir la verificación de integridad del firmware e instalar un firmware malicioso • https://jvn.jp/en/vu/JVNVU95192472/index.html https://jvn.jp/vu/JVNVU95192472/index.html https://www.konicaminolta.com/global/newsroom/topics/2021/1224-01-01.html https://www.konicaminolta.jp/business/support/important/211224_01_01.html •

CVSS: 6.5EPSS: 0%CPEs: 160EXPL: 0

Exposure of sensitive information to an unauthorized actor vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, and bizhub 4752/4052 GC9-X4 and earlier) allows an attacker on the adjacent network to obtain the credentials if the destination information including credentials are registered in the address book via a specific SOAP message. Una vulnerabilidad de exposición de información confidencial a un actor no autorizado en la serie bizhub de KONICA MINOLTA (bizhub versiones C750i G00-35 y anteriores, bizhub versiones C650i/C550i/C450i G00-B6 y anteriores, bizhub versiones C360i/C300i/C250i G00-B6 y anteriores, bizhub versiones 750i/650i/550i/450i G00-37 y anteriores, bizhub versiones 360i/300i G00-33 y anteriores, bizhub versiones C287i/C257i/C227i G00-19 y anteriores, bizhub versiones 306i/266i/246i/226i G00-B6 y anteriores, bizhub versiones C759/C659 GC7-X8 y anteriores, bizhub versiones C658/C558/C458 GC7-X8 y anteriores, bizhub versiones 958/808/758 GC7-X8 y anteriores, bizhub versiones 658e/558e/458e GC7-X8 y anteriores, bizhub versiones C287/C227 GC7-X8 y anteriores, bizhub versiones 287/227 GC7-X8 y anteriores, bizhub versiones 368e/308e GC7-X8 y anteriores, bizhub versiones C368/C308/C258 GC9-X4 y anteriores, bizhub versiones 558/458/368/308 GC9-X4 y anteriores, bizhub versiones C754e/C654e GDQ-M0 y anteriores, bizhub versiones 754e/654e GDQ-M0 y anteriores, bizhub versiones C554e/C454e GDQ-M1 y anteriores, bizhub versiones C364e/C284e/C224e GDQ-M1 y anteriores, bizhub versiones 554e/454e/364e/284e/224e GDQ-M1 y anteriores, bizhub versiones C754/C654 C554/C454 GR1-M0 y anteriores, bizhub versiones C364/C284/C224 GR1-M0 y anteriores, bizhub versiones 754/654 GR1-M0 y anteriores, bizhub versiones C4050i/C3350i/C4000i/C3300i G00-B6 y anteriores, bizhub versiones C3320i G00-B6 y anteriores, bizhub versiones 4750i/4050i G00-22 y anteriores, bizhub versiones 4700i G00-22 y anteriores, bizhub versiones C3851FS/C3851/C3351 GC9-X4 y anteriores, y bizhub versiones 4752/4052 GC9-X4 y anteriores) permite a un atacante en la red adyacente obtener las credenciales si la información de destino, incluyendo las credenciales, se registra en la libreta de direcciones por medio de un mensaje SOAP específico • https://jvn.jp/en/vu/JVNVU95192472/index.html https://jvn.jp/vu/JVNVU95192472/index.html https://www.konicaminolta.com/global/newsroom/topics/2021/1224-01-01.html https://www.konicaminolta.jp/business/support/important/211224_01_01.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •