CVE-2021-28673
https://notcve.org/view.php?id=CVE-2021-28673
Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with "a weaponized clone file" to execute arbitrary commands in the Web User Interface. Xerox Phaser 6510 versiones anteriores a 64.61.23 y 64.59.11 (Bridge), WorkCentre 6515 versiones anteriores a 65.61.23 y 65.59.11 (Bridge), VersaLink B400 versiones anteriores a 37.61.23 y 37.59.01 (Bridge), B405 versiones anteriores a 38.61.23 y 38.59 .01 (Bridge), B600/B610 versiones anteriores a 32.61.23 y 32.59.01 (Bridge), B605/B615 versiones anteriores a 33.61.23 y 33.59.01 (Bridge), B7025/30/35 versiones anteriores a 58.61.23 y 58.59.11 ( Bridge), C400 versiones anteriores a 67.61.23 y 67.59.01 (Bridge), C405 versiones anteriores a 68.61.23 y 68.59.01 (Bridge), C500/C600 versiones anteriores a 61.61.23 y 61.59.01 (Bridge), C505/C605 versiones anteriores a 62.61. 23 y 62.59.11 (Bridge), C7000 versiones anteriores a 56.61.23 y 56.59.01 (Bridge), C7020/25/30 versiones anteriores a 57.61.23 y 57.59.01 (Bridge), C8000/C9000 versiones anteriores a 70.61.23 y 70.59.01 (Bridge), permite a atacantes remotos con "a weaponized clone file" ejecutar comandos arbitrarios en la interfaz de usuario web • https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf •
CVE-2020-36201
https://notcve.org/view.php?id=CVE-2020-36201
An issue was discovered in certain Xerox WorkCentre products. They do not properly encrypt passwords. This affects 3655, 3655i, 58XX, 58XXi 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices. Se detectó un problema en determinados productos Xerox WorkCentre. No cifran apropiadamente las contraseñas. • https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20L_for_ConnectKey-1.pdf • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •
CVE-2020-26162
https://notcve.org/view.php?id=CVE-2020-26162
Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages. Los dispositivos Xerox WorkCentre EC7836 versiones anteriores a 073.050.059.25300 y EC7856 versiones anteriores a 073.020.059.25300, permiten un ataque de tipo XSS por medio de unas páginas de Descripción • https://securitydocs.business.xerox.com https://securitydocs.business.xerox.com/wp-content/uploads/2019/09/cert_Security_Mini_Bulletin_XRX19Y_for_WorkCentre-EC7836-EC7856.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2016-11061
https://notcve.org/view.php?id=CVE-2016-11061
Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, and 7970i devices before 073.xxx.086.15410 do not properly escape parameters in the support/remoteUI/configrui.php script, which can allow an unauthenticated attacker to execute OS commands on the device. Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970 y 7970i versiones anteriores a 073.xxx.086.15410, no escapan apropiadamente los parámetros en el script support/remoteUI/configrui.php, que puede permitir a un atacante no autenticado ejecutar comandos del Sistema Operativo sobre el dispositivo. • https://securitydocs.business.xerox.com/wp-content/uploads/2016/10/cert_Mini_Security_Bulletin_XRX16Q_for_ConnectKey_R16-05_v1-1-2.pdf • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2020-9330
https://notcve.org/view.php?id=CVE-2020-9330
Certain Xerox WorkCentre printers before 073.xxx.000.02300 do not require the user to reenter or validate LDAP bind credentials when changing the LDAP connector IP address. A malicious actor who gains access to affected devices (e.g., by using default credentials) can change the LDAP connection IP address to a system owned by the actor without knowledge of the LDAP bind credentials. After changing the LDAP connection IP address, subsequent authentication attempts will result in the printer sending plaintext LDAP (Active Directory) credentials to the actor. Although the credentials may belong to a non-privileged user, organizations frequently use privileged service accounts to bind to Active Directory. The attacker gains a foothold on the Active Directory domain at a minimum, and may use the credentials to take over control of the Active Directory domain. • https://securitydocs.business.xerox.com/wp-content/uploads/2020/02/cert_Security_Mini_Bulletin_XRX20D_for_ConnectKey.pdf https://www.securicon.com/hackers-can-gain-active-directory-privileges-through-new-vulnerability-in-xerox-printers • CWE-306: Missing Authentication for Critical Function •