Vulnerabilites related to Xerox - Xerox Workplace Suite
CVE-2024-55930 (GCVE-0-2024-55930)
Vulnerability from cvelistv5
Published
2025-01-23 17:36
Modified
2025-02-24 17:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Xerox | Xerox Workplace Suite |
Version: 0 < 5.6.701.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55930", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-23T19:02:22.198650Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-23T19:02:30.320Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "Xerox Workplace Suite", "vendor": "Xerox", "versions": [ { "lessThan": "5.6.701.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-01-23T17:33:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files" } ], "value": "Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files" } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T17:18:39.252Z", "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "shortName": "Xerox" }, "references": [ { "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Weak default folder permissions", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "assignerShortName": "Xerox", "cveId": "CVE-2024-55930", "datePublished": "2025-01-23T17:36:01.763Z", "dateReserved": "2024-12-13T14:30:30.207Z", "dateUpdated": "2025-02-24T17:18:39.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-55931 (GCVE-0-2024-55931)
Vulnerability from cvelistv5
Published
2025-01-27 11:28
Modified
2025-02-24 17:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-922 - Insecure Storage of Sensitive Information
Summary
Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user's session is compromised.
The patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Xerox | Xerox Workplace Suite |
Version: 0 < 5.6.701.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55931", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-27T13:26:58.343505Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T20:01:13.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "Xerox Workplace Suite", "vendor": "Xerox", "versions": [ { "lessThan": "5.6.701.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-01-23T18:22:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eXerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user\u0027s session is compromised.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThe patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin.\u003c/p\u003e" } ], "value": "Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user\u0027s session is compromised.\u00a0\n\nThe patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin." } ], "impacts": [ { "capecId": "CAPEC-102", "descriptions": [ { "lang": "en", "value": "CAPEC-102 Session Sidejacking" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T17:20:04.431Z", "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "shortName": "Xerox" }, "references": [ { "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Token stored in session storage", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "assignerShortName": "Xerox", "cveId": "CVE-2024-55931", "datePublished": "2025-01-27T11:28:45.510Z", "dateReserved": "2024-12-13T14:30:30.207Z", "dateUpdated": "2025-02-24T17:20:04.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-55926 (GCVE-0-2024-55926)
Vulnerability from cvelistv5
Published
2025-01-23 17:12
Modified
2025-02-24 17:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Xerox | Xerox Workplace Suite |
Version: 0 < 5.6.701.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55926", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-23T18:58:12.443714Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-23T18:58:27.492Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "Xerox Workplace Suite", "vendor": "Xerox", "versions": [ { "lessThan": "5.6.701.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-01-23T17:05:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data" } ], "value": "A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data" } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] }, { "capecId": "CAPEC-126", "descriptions": [ { "lang": "en", "value": "CAPEC-126 Path Traversal" } ] }, { "capecId": "CAPEC-78", "descriptions": [ { "lang": "en", "value": "CAPEC-78 Using Escaped Slashes in Alternate Encoding" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T17:11:02.567Z", "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "shortName": "Xerox" }, "references": [ { "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary file upload, deletion and read through header manipulation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "assignerShortName": "Xerox", "cveId": "CVE-2024-55926", "datePublished": "2025-01-23T17:12:21.371Z", "dateReserved": "2024-12-13T14:30:30.206Z", "dateUpdated": "2025-02-24T17:11:02.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-55925 (GCVE-0-2024-55925)
Vulnerability from cvelistv5
Published
2025-01-23 17:03
Modified
2025-09-17 16:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-290 - Authentication Bypass by Spoofing
Summary
In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Xerox | Xerox Workplace Suite |
Version: 0 < 5.6.701.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55925", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-23T18:56:52.411909Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-23T18:57:13.529Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "Xerox Workplace Suite", "vendor": "Xerox", "versions": [ { "lessThan": "5.6.701.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-01-23T17:03:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the \u003ccode\u003eHost\u003c/code\u003e header. If the server improperly validates or trusts the \u003ccode\u003eHost\u003c/code\u003e header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints." } ], "value": "In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints." } ], "impacts": [ { "capecId": "CAPEC-33", "descriptions": [ { "lang": "en", "value": "CAPEC-33 HTTP Request Smuggling" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-17T16:49:42.753Z", "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "shortName": "Xerox" }, "references": [ { "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "API Security bypass through header manipulation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "assignerShortName": "Xerox", "cveId": "CVE-2024-55925", "datePublished": "2025-01-23T17:03:33.187Z", "dateReserved": "2024-12-13T14:30:30.206Z", "dateUpdated": "2025-09-17T16:49:42.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-55929 (GCVE-0-2024-55929)
Vulnerability from cvelistv5
Published
2025-01-23 17:30
Modified
2025-02-24 17:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-345 - Insufficient Verification of Data Authenticity
Summary
A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Xerox | Xerox Workplace Suite |
Version: 0 < 5.6.701.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55929", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-23T19:01:12.854666Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-23T19:01:20.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "Xerox Workplace Suite", "vendor": "Xerox", "versions": [ { "lessThan": "5.6.701.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-01-23T17:26:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources." } ], "value": "A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources." } ], "impacts": [ { "capecId": "CAPEC-151", "descriptions": [ { "lang": "en", "value": "CAPEC-151 Identity Spoofing" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T17:17:09.394Z", "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "shortName": "Xerox" }, "references": [ { "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Mail spoofing", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "assignerShortName": "Xerox", "cveId": "CVE-2024-55929", "datePublished": "2025-01-23T17:30:34.224Z", "dateReserved": "2024-12-13T14:30:30.207Z", "dateUpdated": "2025-02-24T17:17:09.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-55928 (GCVE-0-2024-55928)
Vulnerability from cvelistv5
Published
2025-01-23 17:25
Modified
2025-02-24 17:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Summary
Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Xerox | Xerox Workplace Suite |
Version: 0 < 5.6.701.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55928", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-23T19:00:32.313469Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-23T19:00:57.806Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "Xerox Workplace Suite", "vendor": "Xerox", "versions": [ { "lessThan": "5.6.701.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-01-23T17:21:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption" } ], "value": "Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption" } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312 Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T17:16:19.462Z", "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "shortName": "Xerox" }, "references": [ { "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Clear text secrets returned \u0026 Remote system secrets in clear text", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "assignerShortName": "Xerox", "cveId": "CVE-2024-55928", "datePublished": "2025-01-23T17:25:46.915Z", "dateReserved": "2024-12-13T14:30:30.207Z", "dateUpdated": "2025-02-24T17:16:19.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-55927 (GCVE-0-2024-55927)
Vulnerability from cvelistv5
Published
2025-01-23 17:20
Modified
2025-02-24 17:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-798 - Use of Hard-coded Credentials
Summary
A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Xerox | Xerox Workplace Suite |
Version: 0 < 5.6.701.9 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-55927", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-23T18:59:41.971362Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-23T18:59:54.756Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "Xerox Workplace Suite", "vendor": "Xerox", "versions": [ { "lessThan": "5.6.701.9", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-01-23T17:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions." } ], "value": "A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions." } ], "impacts": [ { "capecId": "CAPEC-633", "descriptions": [ { "lang": "en", "value": "CAPEC-633 Token Impersonation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-24T17:12:10.831Z", "orgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "shortName": "Xerox" }, "references": [ { "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Flawed token generation implementation \u0026 Hard-coded key implementation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "10b61619-3869-496c-8a1e-f291b0e71e3f", "assignerShortName": "Xerox", "cveId": "CVE-2024-55927", "datePublished": "2025-01-23T17:20:29.974Z", "dateReserved": "2024-12-13T14:30:30.207Z", "dateUpdated": "2025-02-24T17:12:10.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }