Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

jeudi 13 décembre 2018

Ricoh myPrint on Windows/Android WSDL API Default Credentials weak authentication

A vulnerability was found in Ricoh myPrint on Windows/Android (unknown version) and classified as critical. This issue affects an unknown function of the component WSDL API. The manipulation with an unknown input leads to a weak authentication vulnerability (Default Credentials). Using CWE to declare the problem leads to CWE-798. Impacted is confidentiality, integrity, and availability.

The weakness was published 12/14/2018 as mailinglist post (Full-Disclosure). The advisory is shared at The identification of this vulnerability is CVE-2018-18006 since 10/05/2018. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 12/16/2018).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.



VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍


Class: Weak authentication / Default Credentials (CWE-798)
Local: Yes
Remote: No

Availability: No

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligence

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Actions: 🔍


Recommended: no mitigation known
0-Day Time: 🔒


10/05/2018 CVE assigned
12/14/2018 Advisory disclosed
12/16/2018 VulDB entry created
12/16/2018 VulDB last update



CVE: CVE-2018-18006 (🔒)
scip Labs:


Created: 12/16/2018
Complete: 🔍

Lien vers l'article source

Auteur: VulDB

Catégories: VulDBNombre de vues: 373


Événements SSI