Vulnerabilites related to ricoh - sp277nwx
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C084AAA8-A995-4BB4-8401-E69B5D2D6E47", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2295D3DC-AF14-49C4-851C-11BF07FCB29D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C009535C-0CAB-4170-BF77-D80F7E7FC2D2", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C99DFFE-3061-49B6-87FE-A9BFD85F50C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E46DF1A5-0CD8-4E74-8DA2-829E2F0F0885", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9905DD-A2CD-41BA-92D9-AD68E891DFA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D59F15CA-17E2-4984-BE84-9EC002FD2961", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9EADB-0852-447A-BB18-18AA37E1CEBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*", "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF", "versionEndExcluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06, tienen un Control de Acceso Incorrecto (problema 1 de 2)." } ], "id": "CVE-2019-14301", "lastModified": "2024-11-21T04:26:26.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T18:15:11.333", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*", "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF", "versionEndExcluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210su_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7A302D2-8EA9-4770-B797-54B4A68268E9", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210su:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D3B1B91-C752-4177-9098-76F96A910509", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210su_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "949F5C47-DEE4-4F01-90E4-E9A577A4DE3A", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210su_q_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "16604595-6307-47CB-A453-F6F2AA107C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210su_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E166CCF1-C5FF-4A10-A9D9-43AB71A42B76", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210su:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB3FB195-30AE-4EAE-A290-EED2F9D1E380", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC1EC8A5-E37B-4BC7-851F-B8A349C0C02F", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "5201E788-DFCD-4288-BC3C-1082F2B48241", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210sf_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C55A4856-E7A8-4022-8588-EC65FC6DD985", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210sf_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "B73D8E6B-5870-468B-BFE6-72829AFE0896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210sf_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68799164-71D7-48C5-9A26-6907D96F69F6", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210sf_q_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "13D69E95-5F4A-431A-BB52-35778AC12B3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_211sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10D03A34-4FAA-4AE5-92D2-22373A184AE4", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_211sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD4B3755-1B04-4C7A-9FFD-ED59CDF49B54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_211su_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F9C3AB-3D8F-4FAD-8017-127D193A7633", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_211su:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D04427-93BC-4400-B183-1A4550F1E600", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C2EDF78-9E24-4F94-B809-69540E879923", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D81037-C1CE-482C-8585-F11C38A227C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C102DB1-363E-4ACB-8805-D1C2814DF1BD", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "A10D2575-8537-4936-9D19-51C9DB0C4674", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210_q_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E89CF45-58F5-4914-8D07-EA41468C41E2", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210_q_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "034A4759-4B33-4EB2-9959-31C387A27FB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_210e_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D854FB4-6B89-4527-854D-DA6EE5F4A34E", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_210e_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "136865AF-C26B-41D2-917E-1B5722EF51FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_211_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E581A4F-FA5B-43F7-83CF-4376AE5A760D", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_211:-:*:*:*:*:*:*:*", "matchCriteriaId": "73C578D8-6AB7-4A89-BC26-5A214128D0A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used." }, { "lang": "es", "value": "En dispositivos Ricoh SP C250DN versi\u00f3n 1.06, un puerto de depuraci\u00f3n puede ser usado." } ], "id": "CVE-2019-14302", "lastModified": "2024-11-21T04:26:26.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T18:15:11.413", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C084AAA8-A995-4BB4-8401-E69B5D2D6E47", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2295D3DC-AF14-49C4-851C-11BF07FCB29D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C009535C-0CAB-4170-BF77-D80F7E7FC2D2", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C99DFFE-3061-49B6-87FE-A9BFD85F50C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E46DF1A5-0CD8-4E74-8DA2-829E2F0F0885", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9905DD-A2CD-41BA-92D9-AD68E891DFA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D59F15CA-17E2-4984-BE84-9EC002FD2961", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9EADB-0852-447A-BB18-18AA37E1CEBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*", "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF", "versionEndExcluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices allow CSRF." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06, permite un ataque de tipo CSRF." } ], "id": "CVE-2019-14304", "lastModified": "2024-11-21T04:26:27.137", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T18:15:11.507", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN52962201/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ricoh.com/info/2019/0823_1/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A6CB78-5698-4977-A222-09E0BC68C4BC", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AE2EE3-D763-4C69-BFC7-67DBAE2EA67B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54202E48-BBEC-4137-BFC3-8EDBDD7D48D0", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A179F7DB-F558-4C34-8225-1A716C6E0E3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F949759F-F079-45B3-8953-AD09C94928D5", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BF7618-7900-472C-A9FA-4B81514CB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA46496-7692-4D16-A510-1CDF66E0E159", "versionEndExcluding": "1.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD9F0BC-7A61-4D8B-A278-C7224C20686A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8899479F-4D08-4C7A-AF08-D18B33754A6D", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C93EC42-D723-410A-8A23-0AAA451C2506", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DD2FAEA-A30A-4F52-8C1D-25657F691C05", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1BF2DD-B341-44CB-B537-FC2A6127CA9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BE3ACF6-4691-4486-B6FD-B64886F8BBC5", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "3280C37F-59C0-44DC-AF41-DF28D159AF64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14860-7610-48E1-9C81-C6F273B95D30", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "82418F70-D63A-4FA7-98D7-371960BA5680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEF6BE33-59B0-4D61-9F4D-EC97071EFEAA", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC09B027-C4B8-481E-BC85-36E60D2A6A08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61872571-F633-43AA-BEA5-9171B81C6147", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CCFF90B-E5F7-4C69-A746-36B5F08BE89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83B250D-7FA6-4BD8-9F78-4EDCB5000F1A", "versionEndExcluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3E99D02-0D57-4CC5-9F7B-015060BCBDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A3FEA6-5EE6-4848-82A6-BD491E8BB9F6", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B14F1-D7F2-41E4-AE35-C741E6B31AFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A37D2-F0EE-4ACF-9E60-B7717EC7EAD6", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "303D94E8-E6EE-4E8C-80A3-3D74B14FC779", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CAFF590-A772-42DE-8800-0081EB60CE4C", "versionEndExcluding": "1.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA57EED-688E-4FFA-9011-F8F50B4850E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9EF1CA-E1F3-40AD-9FDB-64AB24C61F71", "versionEndExcluding": "1.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C13273C-ABE5-4543-A04B-493A1F617125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664A7AFD-16E2-4AB4-A409-40596522C638", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*", "matchCriteriaId": "280ED6CC-B977-4C9B-8EC4-FAB605C39BC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24BBEED4-7C10-4A46-9523-865348B5A40C", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C14354-14B2-4202-A9B8-BB65B0A3BFF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76B05D10-5E4D-4239-B7A7-59540EA8130D", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C5B0A32-50BD-4A9C-B7DA-E6E1D20750F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54D92CC2-0EFC-43E2-B0A3-A332F85E5147", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "472C5167-1FB1-4C27-BE8C-F3959AC64DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5FDEBF-EB68-417E-AF0D-1E9D786E019B", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE5C0004-1043-4EA6-86A9-6C235BC2F71D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6283DF5E-A2AC-46AA-9DEB-B76DEB52C977", "versionEndExcluding": "1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA100DB-8B11-44CA-B8F0-2359E788F274", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2135C13B-5395-4FAC-979C-6CAD20EE221F", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F660AB51-4C12-4B9F-8557-1D0A3148108F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96DAE05B-374A-4149-A2FC-0F9246299AAC", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8BBF428-9C1C-49C9-B37C-D11A3D5FE6B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B16367-B607-4348-9A1B-3D9D7BE6E3C3", "versionEndExcluding": "1.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBC38B1-5311-4263-9D58-A730B6F271AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B403690-F713-4253-AAFF-A29FBED8AA71", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6A147E6-7427-484B-9E74-A359EC6EC557", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2A3DA7-BEAE-4C71-A0DD-D5D65273CB31", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C5BE68-51BF-4038-9B13-411E7F68B265", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F7D26BE-4814-4814-AB29-45170C6236CD", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "D928C1C5-1500-4A90-B11F-050B4151CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF64BC9-4F3A-4E18-AE32-04E6C6627D91", "versionEndExcluding": "1.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7245225-8424-4E8F-BE51-8F3FB2E07649", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2746858-D63D-4AFF-8DED-BF7C8F2BDC93", "versionEndExcluding": "1.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D13A2A-0870-4E48-8309-8A73B9DA9788", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BD6DBA-8298-4CBD-AB0A-86CF9543EB51", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A587C3-C11E-4D5C-A2E1-258955CE6DF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49641455-13A9-4067-94BC-BAD0DF948E2D", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA6501C-A18C-4019-BD37-AD81619E3F18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB22E5-02F5-4CF5-A486-2D85FCFA0855", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9143906C-717E-4B13-B18F-5345ECCC5813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A049DB-EABF-47CE-871E-E2953B0B0336", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "61B9B71C-B26B-48A4-B509-54CD4562CE71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB4C236-437E-40BE-99E1-5B87A5EDF43D", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ACA4098-7918-4F91-88DB-A52C125A7F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B3DD8B9-B020-4A9C-9483-59608AF34836", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3E77D-F865-4845-8FE3-72D2A6C27D04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CAA8A-9249-4A83-8303-DCD497A3D403", "versionEndExcluding": "1.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "17D78F4E-3E5F-4429-91D0-00CDB654BE70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6479E-7D1E-4E75-9655-CC5078EEC971", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "45FAA82A-DE48-4B9B-8805-6C7BAE7B0E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D61DE5-4A98-4C38-BE1C-0A201E3DE798", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D447314-337D-45AE-BF53-EF400A0D2A93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4F82C96-8A84-4758-B751-2E4EB402D2FF", "versionEndExcluding": "1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8CC2924A-4E60-4CD4-9E54-411BE8E100C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F79B35-46E0-4690-8C27-CA4566F33EAF", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A69F798-75EC-462E-965F-2552132C68BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D860DCF2-327E-4C44-A37D-7DBC73D2CAC4", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC1CAF0E-29C8-4692-8BBC-BC085443C85F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16A3335E-8963-4134-AAD4-E94DC644BA79", "versionEndExcluding": "1.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*", "matchCriteriaId": "80C56BB4-1D87-466C-865F-909812506564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "590D1992-6123-47C9-A546-BB758754B5D7", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD58F60-2EA2-4833-9D8B-F85AF0B81719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E05CF252-3A6C-4C51-B3DF-2BBD20BD8AC2", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE733BB-2793-4B8C-8A6D-705BF448CC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D16EF7B-4C5C-4BB5-AAE3-8891748F6206", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*", "matchCriteriaId": "807A448D-54C4-447B-B140-CB3C982C2D14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065D4968-67D4-4F7D-B359-9A792458AE32", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "DD02F8F2-E629-4FDA-BCFA-71BA3A64E8D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D70DEF67-E3FA-4725-A5CB-4DCCF4B93809", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*", "matchCriteriaId": "69909D19-AC7C-4B31-B501-FA1D4330112C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA066087-C58B-41D8-ABAC-FC35EB208DEE", "versionEndExcluding": "1.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*", "matchCriteriaId": "434E29A1-FC22-4327-B872-22EBA7B4C7EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)." }, { "lang": "es", "value": "Los dispositivos Ricoh SP C250DN versi\u00f3n 1.06 tienen un control de acceso incorrecto (problema 2 de 2)." } ], "id": "CVE-2019-14306", "lastModified": "2024-11-21T04:26:27.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-10T18:15:11.583", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ricoh.com/info/2019/0823_1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202001-0768
Vulnerability from variot
On Ricoh SP C250DN 1.06 devices, a debug port can be used. Ricoh SP C250DN The device contains an input validation vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. RICOH SP C250DN is a printer from Ricoh Japan.
There is a security vulnerability in RICOH SP C250DN version 1.06. Attackers can use this vulnerability to retrieve sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0768", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sp c250dn", "scope": "eq", "trust": 1.4, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 277sfnwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp c250dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.09" }, { "model": "sp 221", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp c250sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp 3710dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp c261sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.17" }, { "model": "sp 210su \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 210e \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp 210 \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp 211sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 212sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c262dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.13" }, { "model": "sp c260dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 213snw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.05" }, { "model": "sp c260sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp c252dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.09" }, { "model": "sp 210sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 211", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "m 2700", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 212sfnw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp 210sf \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp c252sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp 3710sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 213sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 213nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp c262sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.17" }, { "model": "mp 2014ad", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp c261dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.13" }, { "model": "sp277nwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "sp 221s", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 220sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 210su", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "m 2701", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 213nw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "sp 210 q \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp 330dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 210", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 212nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 210su q \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 277snwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 221sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 212suw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213sfnw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 210sf q \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 330sfn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213suw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "mp 2014", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 330sn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 220snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 213snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213sfw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212sfw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp 220nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "mp 2014d", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 221nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "sp 211su", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 330dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 330sfn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 330sn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 3710dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 3710sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c250sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c252dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c252sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c260dnw", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03703" }, { "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "db": "NVD", "id": "CVE-2019-14302" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:ricoh:sp_330dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_330sfn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_330sn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_3710dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_3710sf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c250dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c250sf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c252dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c252sf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c260dnw_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014137" } ] }, "cve": "CVE-2019-14302", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2019-14302", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-03703", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2019-14302", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.8, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-14302", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-14302", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-14302", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-03703", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202001-391", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-14302", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03703" }, { "db": "VULMON", "id": "CVE-2019-14302" }, { "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "db": "CNNVD", "id": "CNNVD-202001-391" }, { "db": "NVD", "id": "CVE-2019-14302" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On Ricoh SP C250DN 1.06 devices, a debug port can be used. Ricoh SP C250DN The device contains an input validation vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. RICOH SP C250DN is a printer from Ricoh Japan. \n\r\n\r\nThere is a security vulnerability in RICOH SP C250DN version 1.06. Attackers can use this vulnerability to retrieve sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2019-14302" }, { "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "db": "CNVD", "id": "CNVD-2020-03703" }, { "db": "VULMON", "id": "CVE-2019-14302" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-14302", "trust": 3.1 }, { "db": "JVN", "id": "JVN52962201", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2019-014137", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2020-03703", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-391", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-14302", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03703" }, { "db": "VULMON", "id": "CVE-2019-14302" }, { "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "db": "CNNVD", "id": "CNNVD-202001-391" }, { "db": "NVD", "id": "CVE-2019-14302" } ] }, "id": "VAR-202001-0768", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-03703" } ], "trust": 1.1948718 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03703" } ] }, "last_update_date": "2024-11-23T21:36:14.268000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "UPDATE\uff1aPotential security vulnerabilities in some of Ricoh\u0027s printers and Multifunction Printers (MFPs)", "trust": 0.8, "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "title": "Patch for Unknown vulnerability in RICOH SP C250DN", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/198937" }, { "title": "RICOH SP C250DN Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108425" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2019-14302 " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03703" }, { "db": "VULMON", "id": "CVE-2019-14302" }, { "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "db": "CNNVD", "id": "CNNVD-202001-391" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "db": "NVD", "id": "CVE-2019-14302" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14302" }, { "trust": 1.7, "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "trust": 1.7, "url": "http://jvn.jp/en/jp/jvn52962201/index.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14302" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2019/jvndb-2019-014137.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2019-14302" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03703" }, { "db": "VULMON", "id": "CVE-2019-14302" }, { "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "db": "CNNVD", "id": "CNNVD-202001-391" }, { "db": "NVD", "id": "CVE-2019-14302" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-03703" }, { "db": "VULMON", "id": "CVE-2019-14302" }, { "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "db": "CNNVD", "id": "CNNVD-202001-391" }, { "db": "NVD", "id": "CVE-2019-14302" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2020-03703" }, { "date": "2020-01-10T00:00:00", "db": "VULMON", "id": "CVE-2019-14302" }, { "date": "2020-02-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "date": "2020-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-391" }, { "date": "2020-01-10T18:15:11.413000", "db": "NVD", "id": "CVE-2019-14302" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2020-03703" }, { "date": "2023-02-01T00:00:00", "db": "VULMON", "id": "CVE-2019-14302" }, { "date": "2020-02-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014137" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-391" }, { "date": "2024-11-21T04:26:26.787000", "db": "NVD", "id": "CVE-2019-14302" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ricoh SP C250DN Device input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014137" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-391" } ], "trust": 0.6 } }
var-202001-0767
Vulnerability from variot
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2). Ricoh SP C250DN The device contains an authentication vulnerability.Information may be obtained. RICOH SP C250DN is a printer from Ricoh Japan.
An information disclosure vulnerability exists in RICOH SP C250DN version 1.06. The vulnerability stems from configuration errors during the operation of the network system or product. An unauthorized attacker could use the vulnerability to obtain sensitive information about the affected component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sp c250dn", "scope": "eq", "trust": 1.4, "vendor": "ricoh", "version": "1.06" }, { "model": "m c250fw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp 277sfnwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp c250dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.09" }, { "model": "sp 221", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp c250sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp 3710dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp c261sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.17" }, { "model": "sp 212sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c262dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.13" }, { "model": "sp c260dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 213snw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.05" }, { "model": "sp c260sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp c252dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.09" }, { "model": "m 2700", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 212sfnw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c252sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp 3710sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 213sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 213nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "p c301w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp c262sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.17" }, { "model": "mp 2014ad", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 212sfw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c261dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.13" }, { "model": "m c250fwb", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp277nwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "sp 220sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "m 2701", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 213nw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "p c300w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp 330dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 277snwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 221sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 212suw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213sfnw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 330sfn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213suw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "mp 2014", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 330sn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 220snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 213snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213sfw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221s", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 220nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "mp 2014d", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 221nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "m c250fw", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "m c250fwb", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "p c300w", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "p c301w", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 330sfn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 330sn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c250sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c252dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c252sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02455" }, { "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "db": "NVD", "id": "CVE-2019-14301" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:ricoh:m_c250fw_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:m_c250fwb_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:p_c300w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:p_c301w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_330sfn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_330sn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c250dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c250sf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c252dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c252sf_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014136" } ] }, "cve": "CVE-2019-14301", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-14301", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-02455", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-14301", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-14301", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-14301", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-14301", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-02455", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202001-406", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-14301", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02455" }, { "db": "VULMON", "id": "CVE-2019-14301" }, { "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "db": "CNNVD", "id": "CNNVD-202001-406" }, { "db": "NVD", "id": "CVE-2019-14301" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2). Ricoh SP C250DN The device contains an authentication vulnerability.Information may be obtained. RICOH SP C250DN is a printer from Ricoh Japan. \n\nAn information disclosure vulnerability exists in RICOH SP C250DN version 1.06. The vulnerability stems from configuration errors during the operation of the network system or product. An unauthorized attacker could use the vulnerability to obtain sensitive information about the affected component", "sources": [ { "db": "NVD", "id": "CVE-2019-14301" }, { "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "db": "CNVD", "id": "CNVD-2020-02455" }, { "db": "VULMON", "id": "CVE-2019-14301" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-14301", "trust": 3.1 }, { "db": "JVN", "id": "JVN52962201", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2019-014136", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2020-02455", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-406", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-14301", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02455" }, { "db": "VULMON", "id": "CVE-2019-14301" }, { "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "db": "CNNVD", "id": "CNNVD-202001-406" }, { "db": "NVD", "id": "CVE-2019-14301" } ] }, "id": "VAR-202001-0767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-02455" } ], "trust": 1.1948718 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02455" } ] }, "last_update_date": "2024-11-23T21:36:14.327000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "UPDATE\uff1aPotential security vulnerabilities in some of Ricoh\u0027s printers and Multifunction Printers (MFPs)", "trust": 0.8, "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "title": "Patch for RICOH SP C250DN Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/197267" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2019-14301 " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02455" }, { "db": "VULMON", "id": "CVE-2019-14301" }, { "db": "JVNDB", "id": "JVNDB-2019-014136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.0 }, { "problemtype": "CWE-287", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "db": "NVD", "id": "CVE-2019-14301" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14301" }, { "trust": 1.7, "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "trust": 1.7, "url": "http://jvn.jp/en/jp/jvn52962201/index.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14301" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2019/jvndb-2019-014136.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2019-14301" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02455" }, { "db": "VULMON", "id": "CVE-2019-14301" }, { "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "db": "CNNVD", "id": "CNNVD-202001-406" }, { "db": "NVD", "id": "CVE-2019-14301" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-02455" }, { "db": "VULMON", "id": "CVE-2019-14301" }, { "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "db": "CNNVD", "id": "CNNVD-202001-406" }, { "db": "NVD", "id": "CVE-2019-14301" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2020-02455" }, { "date": "2020-01-10T00:00:00", "db": "VULMON", "id": "CVE-2019-14301" }, { "date": "2020-02-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "date": "2020-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-406" }, { "date": "2020-01-10T18:15:11.333000", "db": "NVD", "id": "CVE-2019-14301" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2020-02455" }, { "date": "2023-02-01T00:00:00", "db": "VULMON", "id": "CVE-2019-14301" }, { "date": "2020-02-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014136" }, { "date": "2023-02-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-406" }, { "date": "2024-11-21T04:26:26.527000", "db": "NVD", "id": "CVE-2019-14301" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-406" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "RICOH SP C250DN Information Disclosure Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-02455" }, { "db": "CNNVD", "id": "CNNVD-202001-406" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-406" } ], "trust": 0.6 } }
var-202001-0764
Vulnerability from variot
Ricoh SP C250DN 1.06 devices allow CSRF. Ricoh SP C250DN The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. RICOH SP C250DN is a printer from Ricoh Japan. The vulnerability stems from a web application's insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0764", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "m c250fw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp 277sfnwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp c250dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.09" }, { "model": "sp 221", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp c250sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp 3710dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp c261sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.17" }, { "model": "sp 212sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c262dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.13" }, { "model": "sp c260dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 213snw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.05" }, { "model": "sp c260sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp c252dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.09" }, { "model": "m 2700", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 212sfnw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c252sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp 3710sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 213sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 213nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "p c301w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp c262sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.17" }, { "model": "mp 2014ad", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 212sfw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c261dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.13" }, { "model": "m c250fwb", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp277nwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "sp 220sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "m 2701", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 213nw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "p c300w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp 330dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 277snwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 221sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 212suw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213sfnw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 330sfn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213suw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "mp 2014", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 330sn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 220snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 213snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213sfw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221s", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 220nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "mp 2014d", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 221nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "m c250fw", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "m c250fwb", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "p c300w", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "p c301w", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 330sfn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 330sn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c250dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c250sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c252dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c252sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c250dn", "scope": "eq", "trust": 0.6, "vendor": "ricoh", "version": "1.06" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02454" }, { "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "db": "NVD", "id": "CVE-2019-14304" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:ricoh:m_c250fw_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:m_c250fwb_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:p_c300w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:p_c301w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_330sfn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_330sn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c250dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c250sf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c252dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c252sf_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014031" } ] }, "cve": "CVE-2019-14304", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-14304", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-02454", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-14304", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-14304", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-14304", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-14304", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-02454", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202001-393", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02454" }, { "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "db": "CNNVD", "id": "CNNVD-202001-393" }, { "db": "NVD", "id": "CVE-2019-14304" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ricoh SP C250DN 1.06 devices allow CSRF. Ricoh SP C250DN The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. RICOH SP C250DN is a printer from Ricoh Japan. The vulnerability stems from a web application\u0027s insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client", "sources": [ { "db": "NVD", "id": "CVE-2019-14304" }, { "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "db": "CNVD", "id": "CNVD-2020-02454" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-14304", "trust": 3.0 }, { "db": "JVN", "id": "JVN52962201", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2019-014031", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2020-02454", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-393", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02454" }, { "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "db": "CNNVD", "id": "CNNVD-202001-393" }, { "db": "NVD", "id": "CVE-2019-14304" } ] }, "id": "VAR-202001-0764", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-02454" } ], "trust": 1.1948718 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02454" } ] }, "last_update_date": "2024-11-23T21:36:14.300000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "UPDATE\uff1aPotential security vulnerabilities in some of Ricoh\u0027s printers and Multifunction Printers (MFPs)", "trust": 0.8, "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "title": "Patch for RICOH SP C250DN Cross-Site Request Forgery Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/197259" }, { "title": "RICOH SP C250DN Fixes for cross-site request forgery vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108426" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02454" }, { "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "db": "CNNVD", "id": "CNNVD-202001-393" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "db": "NVD", "id": "CVE-2019-14304" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14304" }, { "trust": 1.6, "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "trust": 1.6, "url": "http://jvn.jp/en/jp/jvn52962201/index.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14304" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2019/jvndb-2019-014031.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02454" }, { "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "db": "CNNVD", "id": "CNNVD-202001-393" }, { "db": "NVD", "id": "CVE-2019-14304" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-02454" }, { "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "db": "CNNVD", "id": "CNNVD-202001-393" }, { "db": "NVD", "id": "CVE-2019-14304" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2020-02454" }, { "date": "2020-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "date": "2020-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-393" }, { "date": "2020-01-10T18:15:11.507000", "db": "NVD", "id": "CVE-2019-14304" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2020-02454" }, { "date": "2020-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014031" }, { "date": "2020-05-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-393" }, { "date": "2024-11-21T04:26:27.137000", "db": "NVD", "id": "CVE-2019-14304" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-393" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "RICOH SP C250DN Cross-Site Request Forgery Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-02454" }, { "db": "CNNVD", "id": "CNNVD-202001-393" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-393" } ], "trust": 0.6 } }
var-202001-0765
Vulnerability from variot
Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2). Ricoh SP C250DN The device contains an authentication vulnerability.Information may be obtained. RICOH SP C250DN is a printer from Ricoh Japan.
An information disclosure vulnerability exists in RICOH SP C250DN version 1.06. The vulnerability stems from configuration errors during the operation of the network system or product. An unauthorized attacker could use the vulnerability to obtain sensitive information about the affected component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0765", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sp c250dn", "scope": "eq", "trust": 1.4, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 277sfnwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp c250dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.09" }, { "model": "sp 221", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.02" }, { "model": "sp c250sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp 3710dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp c261sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.17" }, { "model": "sp 212sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c262dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.13" }, { "model": "sp c260dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 213snw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.05" }, { "model": "sp c260sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp c252dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.09" }, { "model": "m 2700", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 212sfnw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp c252sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.15" }, { "model": "sp 3710sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 213sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213w", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 213nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp c262sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.17" }, { "model": "mp 2014ad", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp c261dnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.13" }, { "model": "sp277nwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "sp 221s", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 220sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "m 2701", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 213nw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "sp 330dn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 277snwx", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 221sf", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 212suw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213sfnw \\", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.06" }, { "model": "sp 330sfn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213suw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "mp 2014", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 330sn", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 221sfnw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.12" }, { "model": "sp 220snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.11" }, { "model": "sp 213snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 213sfw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212snw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.07" }, { "model": "sp 212sfw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.08" }, { "model": "sp 220nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "mp 2014d", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.10" }, { "model": "sp 221nw", "scope": "lt", "trust": 1.0, "vendor": "ricoh", "version": "1.04" }, { "model": "sp 330dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 330sfn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 330sn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 3710dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp 3710sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c250sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c252dn", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c252sf", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null }, { "model": "sp c260dnw", "scope": null, "trust": 0.8, "vendor": "ricoh", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02453" }, { "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "db": "NVD", "id": "CVE-2019-14306" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:ricoh:sp_330dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_330sfn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_330sn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_3710dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_3710sf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c250dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c250sf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c252dn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c252sf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:ricoh:sp_c260dnw_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014138" } ] }, "cve": "CVE-2019-14306", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-14306", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-02453", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-14306", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-14306", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-14306", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-14306", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-02453", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202001-394", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02453" }, { "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "db": "CNNVD", "id": "CNNVD-202001-394" }, { "db": "NVD", "id": "CVE-2019-14306" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2). Ricoh SP C250DN The device contains an authentication vulnerability.Information may be obtained. RICOH SP C250DN is a printer from Ricoh Japan. \n\nAn information disclosure vulnerability exists in RICOH SP C250DN version 1.06. The vulnerability stems from configuration errors during the operation of the network system or product. An unauthorized attacker could use the vulnerability to obtain sensitive information about the affected component", "sources": [ { "db": "NVD", "id": "CVE-2019-14306" }, { "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "db": "CNVD", "id": "CNVD-2020-02453" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-14306", "trust": 3.0 }, { "db": "JVN", "id": "JVN52962201", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2019-014138", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2020-02453", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-394", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02453" }, { "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "db": "CNNVD", "id": "CNNVD-202001-394" }, { "db": "NVD", "id": "CVE-2019-14306" } ] }, "id": "VAR-202001-0765", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-02453" } ], "trust": 1.1948718 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02453" } ] }, "last_update_date": "2024-11-23T21:36:14.240000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "UPDATE\uff1aPotential security vulnerabilities in some of Ricoh\u0027s printers and Multifunction Printers (MFPs)", "trust": 0.8, "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "title": "Patch for RICOH SP C250DN Information Disclosure Vulnerability (CNVD-2020-02453)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/197265" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02453" }, { "db": "JVNDB", "id": "JVNDB-2019-014138" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-287", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "db": "NVD", "id": "CVE-2019-14306" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14306" }, { "trust": 1.6, "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "trust": 1.6, "url": "http://jvn.jp/en/jp/jvn52962201/index.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14306" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2019/jvndb-2019-014138.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02453" }, { "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "db": "CNNVD", "id": "CNNVD-202001-394" }, { "db": "NVD", "id": "CVE-2019-14306" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-02453" }, { "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "db": "CNNVD", "id": "CNNVD-202001-394" }, { "db": "NVD", "id": "CVE-2019-14306" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2020-02453" }, { "date": "2020-02-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "date": "2020-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-394" }, { "date": "2020-01-10T18:15:11.583000", "db": "NVD", "id": "CVE-2019-14306" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2020-02453" }, { "date": "2020-02-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014138" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-394" }, { "date": "2024-11-21T04:26:27.530000", "db": "NVD", "id": "CVE-2019-14306" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-394" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ricoh SP C250DN Authentication vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014138" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-394" } ], "trust": 0.6 } }
CVE-2019-14302 (GCVE-0-2019-14302)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://www.ricoh.com/info/2019/0823_1/ | x_refsource_CONFIRM | |
http://jvn.jp/en/jp/JVN52962201/index.html | third-party-advisory, x_refsource_JVN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-25T04:06:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On Ricoh SP C250DN 1.06 devices, a debug port can be used." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "CONFIRM", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14302", "datePublished": "2020-01-10T17:59:46", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14301 (GCVE-0-2019-14301)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://www.ricoh.com/info/2019/0823_1/ | x_refsource_CONFIRM | |
http://jvn.jp/en/jp/JVN52962201/index.html | third-party-advisory, x_refsource_JVN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-25T04:06:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "CONFIRM", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14301", "datePublished": "2020-01-10T18:00:09", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14304 (GCVE-0-2019-14304)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://www.ricoh.com/info/2019/0823_1/ | x_refsource_CONFIRM | |
http://jvn.jp/en/jp/JVN52962201/index.html | third-party-advisory, x_refsource_JVN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices allow CSRF." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-25T04:06:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.06 devices allow CSRF." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "CONFIRM", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14304", "datePublished": "2020-01-10T17:58:30", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-14306 (GCVE-0-2019-14306)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://www.ricoh.com/info/2019/0823_1/ | x_refsource_CONFIRM | |
http://jvn.jp/en/jp/JVN52962201/index.html | third-party-advisory, x_refsource_JVN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:12:43.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-25T04:06:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "CONFIRM", "url": "https://www.ricoh.com/info/2019/0823_1/" }, { "name": "JVN#52962201", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52962201/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14306", "datePublished": "2020-01-10T17:59:24", "dateReserved": "2019-07-27T00:00:00", "dateUpdated": "2024-08-05T00:12:43.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }