RICOH Interactive Whiteboard D2200 V1.1 to V2.2, D5500 V1.1 to V2.2, D5510 V1.1 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.1 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) uses hard-coded credentials, which may allow an attacker on the same network segments to login to the administrators settings screen and change the configuration.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN55263945/index.html | Third Party Advisory |
https://www.ricoh.com/info/2018/1127_1.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2019-01-09 23:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-16186
Mitre link : CVE-2018-16186
CVE.ORG link : CVE-2018-16186
JSON object : View
Products Affected
ricoh
- d8400_firmware
- d5510
- d5520
- d8400
- d7500_firmware
- d5510_firmware
- d5500_firmware
- d5520_firmware
- d2200
- d5500
- d7500
- d2200_firmware
- d6500_firmware
- d6500
- d6510
- d6510_firmware
CWE
CWE-798
Use of Hard-coded Credentials