CVE-2018-18006

Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ricoh:myprint:2.2.7:*:*:*:*:android:*:*
cpe:2.3:a:ricoh:myprint:2.9.2.4:*:*:*:*:windows:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2018/Nov/46 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Nov/46 - Exploit, Mailing List, Third Party Advisory

Information

Published : 2018-12-14 15:29

Updated : 2024-11-21 03:55


NVD link : CVE-2018-18006

Mitre link : CVE-2018-18006

CVE.ORG link : CVE-2018-18006


JSON object : View

Products Affected

ricoh

  • myprint
CWE
CWE-798

Use of Hard-coded Credentials