Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Nov/46 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Nov/46 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2018/Nov/46 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2018-12-14 15:29
Updated : 2024-11-21 03:55
NVD link : CVE-2018-18006
Mitre link : CVE-2018-18006
CVE.ORG link : CVE-2018-18006
JSON object : View
Products Affected
ricoh
- myprint
CWE
CWE-798
Use of Hard-coded Credentials