Search criteria
9 vulnerabilities found for versalink_c8000_firmware by xerox
FKIE_CVE-2021-28672
Vulnerability from fkie_nvd - Published: 2021-03-29 21:15 - Updated: 2024-11-21 06:00
Severity ?
Summary
Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5633F976-7DC2-4885-9E11-9AAC43AC6F4F",
"versionEndExcluding": "64.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA6DAC0-C2AF-4596-8083-FF2AD9850F5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "750494D1-9A26-4438-9314-73287CA902FE",
"versionEndExcluding": "65.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF327B8-0027-4782-9E70-9B1B761BB535",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF420769-56A8-4524-A9F3-2383903A3415",
"versionEndExcluding": "37.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6371B2E-7D30-4EE1-BA02-C80BAD217C80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BF5358-BCD6-45DC-8BFB-D2A4F8BAD483",
"versionEndExcluding": "38.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5919C7E6-3005-4737-AAD3-A6531C605DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A47E31-C28E-4F13-B61B-08E652D73B52",
"versionEndExcluding": "32.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C631EF-0AA0-4D06-868D-099862B5550A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44CAC202-CA06-462A-AFD8-C1C354C22E37",
"versionEndExcluding": "32.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1980B9F3-19AB-4815-8452-AE42821263ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5034A2-5C77-4A15-8FC9-09B55EC8B538",
"versionEndExcluding": "33.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80723C2-0840-4190-9089-DE15CC43278F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5023922A-C99E-47D0-8BBC-763D71EAF60E",
"versionEndExcluding": "33.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7A10DC-991A-45B3-A12C-10B1C8F743D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94323AC6-C591-4164-AC01-BFBB823BDF74",
"versionEndExcluding": "58.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6EA77E-C999-462B-9605-878940771608",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9A0266-919C-4A1B-B81F-156D8695C88F",
"versionEndExcluding": "58.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FB9A38-795D-4D74-A1E9-CEBAC7502D1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22707910-6725-4EEC-9141-5A6A1B9A72B7",
"versionEndExcluding": "58.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9FF2BE-5998-4795-8237-9111D47B7C18",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C86E3187-F1C3-450D-9AB0-53A7A70C010B",
"versionEndExcluding": "67.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0332FC06-B7B4-49CB-BACC-DEF2A8EEE0F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4D3C46-6C3A-48EB-A549-2EF2401534B1",
"versionEndExcluding": "68.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7B6C70-5272-47B2-BC5F-B1F9DFCA7C42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "570FE8D7-76FA-4228-B1CB-406262E6F526",
"versionEndExcluding": "61.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053A2DDD-5314-455D-8793-ADA8CEEDF7F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74B71E96-FD70-4178-9FBB-4CF715D5E97B",
"versionEndExcluding": "61.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCD5A6F-DF0C-4C82-88BA-7CC5FE1EED2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "262D05E0-80BF-448D-9AAF-0B7648578AC8",
"versionEndExcluding": "62.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A83540-B071-4EE3-A98D-1BEE3C8FD3E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD1973D8-F1AE-4D78-AA04-C5D67CA38A90",
"versionEndExcluding": "62.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73BF6B1C-15E4-4C01-A571-1E6FB737ECAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2F8FB6-57E9-4090-8235-B13B4F71901A",
"versionEndExcluding": "56.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A937272-E36B-420D-8407-D44C78ACEC65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86FF6E4B-1AA6-4596-AA0D-1EB3EBF2B76C",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2112B6B-C983-4323-AAE5-364272C2C070",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C48BB6CD-C8A1-41C6-B3E6-7127FDC5DD83",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3812A4B0-D2DA-4180-9AC8-FF547A501C0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F88A9A3D-294C-4243-8B48-BA8FECFE5ECB",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD3D52F-B865-4217-8CF0-ACEABDB68378",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DF772C7-4B2B-45C1-A50A-71065AA20BCB",
"versionEndExcluding": "70.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1A0557-4A74-45F7-8B98-447454BF8A58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0DD467-6A5A-412C-87CC-44E06C6FC9D4",
"versionEndExcluding": "70.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4297DF3C-E132-4300-B891-9732EE003C3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "653B7C66-AF28-4291-85E6-34DDA5A87F0C",
"versionEndExcluding": "64.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA6DAC0-C2AF-4596-8083-FF2AD9850F5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "337586F8-B995-403E-B5F1-BDDE7B6F943C",
"versionEndExcluding": "65.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF327B8-0027-4782-9E70-9B1B761BB535",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "558E7E0D-2A96-417F-8D06-4EC7C2AFBD36",
"versionEndExcluding": "37.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6371B2E-7D30-4EE1-BA02-C80BAD217C80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0461B49-6FE4-463A-BBFF-893A2D22C0A5",
"versionEndExcluding": "38.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5919C7E6-3005-4737-AAD3-A6531C605DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74D87A46-F240-41F5-82DA-D84CFEE88E6A",
"versionEndExcluding": "32.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1980B9F3-19AB-4815-8452-AE42821263ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05B9EEE4-6F93-43DD-A1CC-DF69CC89ED7B",
"versionEndExcluding": "33.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80723C2-0840-4190-9089-DE15CC43278F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "653D7D9B-4A77-42C2-93E8-A74640BBE463",
"versionEndExcluding": "33.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7A10DC-991A-45B3-A12C-10B1C8F743D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE7F2A3F-0FBA-43BC-88BD-CC3744852525",
"versionEndExcluding": "58.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6EA77E-C999-462B-9605-878940771608",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA4EE31-4F98-4036-9FA7-965F7AD672D7",
"versionEndExcluding": "67.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0332FC06-B7B4-49CB-BACC-DEF2A8EEE0F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B22293E7-E22D-4DEF-AD5F-D32AE16DE98D",
"versionEndExcluding": "68.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7B6C70-5272-47B2-BC5F-B1F9DFCA7C42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AD4291-3782-491E-92C6-53F09EE1684A",
"versionEndExcluding": "61.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053A2DDD-5314-455D-8793-ADA8CEEDF7F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A7E308C-B348-45E8-86FA-841D3B65104A",
"versionEndExcluding": "61.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCD5A6F-DF0C-4C82-88BA-7CC5FE1EED2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A67E21D-4BD7-4EDE-BCC0-CC75BE91ED6A",
"versionEndExcluding": "62.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A83540-B071-4EE3-A98D-1BEE3C8FD3E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50869EEA-C324-4624-9B10-8C79E5598317",
"versionEndExcluding": "62.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73BF6B1C-15E4-4C01-A571-1E6FB737ECAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1794A6-C464-4D35-B1FE-60904349BD50",
"versionEndExcluding": "56.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A937272-E36B-420D-8407-D44C78ACEC65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0B729C-01EC-47E9-81AA-66A4F05A986B",
"versionEndExcluding": "57.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2112B6B-C983-4323-AAE5-364272C2C070",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A14506C-18DF-45E8-B407-5FB1BB454039",
"versionEndExcluding": "57.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3812A4B0-D2DA-4180-9AC8-FF547A501C0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F25AFA1-3701-4E91-BE88-AC755B9F7617",
"versionEndExcluding": "57.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD3D52F-B865-4217-8CF0-ACEABDB68378",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "379F02B6-817B-4250-A46D-2F17C123E8E6",
"versionEndExcluding": "70.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1A0557-4A74-45F7-8B98-447454BF8A58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DE5967-2045-4C72-88B9-A49F520F8D43",
"versionEndExcluding": "70.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4297DF3C-E132-4300-B891-9732EE003C3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c8000w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D609EA4F-631A-4BFF-A221-5C67F602F71E",
"versionEndExcluding": "72.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c8000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955EEB44-F267-4463-A7D0-462664EC0C85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94DCCD95-730E-4DA3-8775-D347942D3175",
"versionEndExcluding": "32.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C631EF-0AA0-4D06-868D-099862B5550A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE6E891-AC7F-4BB4-A06D-ED2B2A47466E",
"versionEndExcluding": "58.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FB9A38-795D-4D74-A1E9-CEBAC7502D1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B11F2D76-1081-4783-9820-9EF7D8653E90",
"versionEndExcluding": "58.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9FF2BE-5998-4795-8237-9111D47B7C18",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling."
},
{
"lang": "es",
"value": "Xerox Phaser 6510 versiones anteriores a 64.65.51 y 64.59.11 (Bridge), WorkCentre 6515 versiones anteriores a 65.65.51 y 65.59.11 (Bridge), VersaLink B400 versiones anteriores a 37.65.51 y 37.59.01 (Bridge), B405 versiones anteriores a 38.65.51 y 38.59 .01 (Bridge), B600/B610 versiones anteriores a 32.65.51 y 32.59.01 (Bridge), B605/B615 versiones anteriores a 33.65.51 y 33.59.01 (Bridge), B7025/30/35 versiones anteriores a 58.65.51 y 58.59.11 ( Bridge), C400 versiones anteriores a 67.65.51 y 67.59.01 (Bridge), C405 versiones anteriores a 68.65.51 y 68.59.01 (Bridge), C500/C600 versiones anteriores a 61.65.51 y 61.59.01 (Bridge), C505/C605 versiones anteriores a 62.65. 51 y 62.59.01 (Bridge), C7000 versiones anteriores a 56.65.51 y 56.59.01 (Bridge), C7020/25/30 versiones anteriores a 57.65.51 y 57.59.01 (Bridge), C8000/C9000 versiones anteriores a 70.65.51 y 70.59.01 (Bridge), C8000W versiones anteriores a 72.65.51, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un desbordamiento del b\u00fafer en el manejo de par\u00e1metros de la p\u00e1gina Web"
}
],
"id": "CVE-2021-28672",
"lastModified": "2024-11-21T06:00:04.843",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-03-29T21:15:13.593",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-28671
Vulnerability from fkie_nvd - Published: 2021-03-29 21:15 - Updated: 2024-11-21 06:00
Severity ?
Summary
Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with "a weaponized clone file" to execute arbitrary commands.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5633F976-7DC2-4885-9E11-9AAC43AC6F4F",
"versionEndExcluding": "64.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA6DAC0-C2AF-4596-8083-FF2AD9850F5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "750494D1-9A26-4438-9314-73287CA902FE",
"versionEndExcluding": "65.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF327B8-0027-4782-9E70-9B1B761BB535",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF420769-56A8-4524-A9F3-2383903A3415",
"versionEndExcluding": "37.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6371B2E-7D30-4EE1-BA02-C80BAD217C80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BF5358-BCD6-45DC-8BFB-D2A4F8BAD483",
"versionEndExcluding": "38.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5919C7E6-3005-4737-AAD3-A6531C605DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A47E31-C28E-4F13-B61B-08E652D73B52",
"versionEndExcluding": "32.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C631EF-0AA0-4D06-868D-099862B5550A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44CAC202-CA06-462A-AFD8-C1C354C22E37",
"versionEndExcluding": "32.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1980B9F3-19AB-4815-8452-AE42821263ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5034A2-5C77-4A15-8FC9-09B55EC8B538",
"versionEndExcluding": "33.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80723C2-0840-4190-9089-DE15CC43278F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5023922A-C99E-47D0-8BBC-763D71EAF60E",
"versionEndExcluding": "33.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7A10DC-991A-45B3-A12C-10B1C8F743D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94323AC6-C591-4164-AC01-BFBB823BDF74",
"versionEndExcluding": "58.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6EA77E-C999-462B-9605-878940771608",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9A0266-919C-4A1B-B81F-156D8695C88F",
"versionEndExcluding": "58.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FB9A38-795D-4D74-A1E9-CEBAC7502D1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22707910-6725-4EEC-9141-5A6A1B9A72B7",
"versionEndExcluding": "58.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9FF2BE-5998-4795-8237-9111D47B7C18",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C86E3187-F1C3-450D-9AB0-53A7A70C010B",
"versionEndExcluding": "67.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0332FC06-B7B4-49CB-BACC-DEF2A8EEE0F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4D3C46-6C3A-48EB-A549-2EF2401534B1",
"versionEndExcluding": "68.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7B6C70-5272-47B2-BC5F-B1F9DFCA7C42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "570FE8D7-76FA-4228-B1CB-406262E6F526",
"versionEndExcluding": "61.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053A2DDD-5314-455D-8793-ADA8CEEDF7F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74B71E96-FD70-4178-9FBB-4CF715D5E97B",
"versionEndExcluding": "61.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCD5A6F-DF0C-4C82-88BA-7CC5FE1EED2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "262D05E0-80BF-448D-9AAF-0B7648578AC8",
"versionEndExcluding": "62.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A83540-B071-4EE3-A98D-1BEE3C8FD3E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD1973D8-F1AE-4D78-AA04-C5D67CA38A90",
"versionEndExcluding": "62.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73BF6B1C-15E4-4C01-A571-1E6FB737ECAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2F8FB6-57E9-4090-8235-B13B4F71901A",
"versionEndExcluding": "56.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A937272-E36B-420D-8407-D44C78ACEC65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86FF6E4B-1AA6-4596-AA0D-1EB3EBF2B76C",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2112B6B-C983-4323-AAE5-364272C2C070",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C48BB6CD-C8A1-41C6-B3E6-7127FDC5DD83",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3812A4B0-D2DA-4180-9AC8-FF547A501C0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F88A9A3D-294C-4243-8B48-BA8FECFE5ECB",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD3D52F-B865-4217-8CF0-ACEABDB68378",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DF772C7-4B2B-45C1-A50A-71065AA20BCB",
"versionEndExcluding": "70.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1A0557-4A74-45F7-8B98-447454BF8A58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0DD467-6A5A-412C-87CC-44E06C6FC9D4",
"versionEndExcluding": "70.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4297DF3C-E132-4300-B891-9732EE003C3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "653B7C66-AF28-4291-85E6-34DDA5A87F0C",
"versionEndExcluding": "64.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA6DAC0-C2AF-4596-8083-FF2AD9850F5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "337586F8-B995-403E-B5F1-BDDE7B6F943C",
"versionEndExcluding": "65.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF327B8-0027-4782-9E70-9B1B761BB535",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "558E7E0D-2A96-417F-8D06-4EC7C2AFBD36",
"versionEndExcluding": "37.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6371B2E-7D30-4EE1-BA02-C80BAD217C80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0461B49-6FE4-463A-BBFF-893A2D22C0A5",
"versionEndExcluding": "38.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5919C7E6-3005-4737-AAD3-A6531C605DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74D87A46-F240-41F5-82DA-D84CFEE88E6A",
"versionEndExcluding": "32.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1980B9F3-19AB-4815-8452-AE42821263ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05B9EEE4-6F93-43DD-A1CC-DF69CC89ED7B",
"versionEndExcluding": "33.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80723C2-0840-4190-9089-DE15CC43278F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "653D7D9B-4A77-42C2-93E8-A74640BBE463",
"versionEndExcluding": "33.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7A10DC-991A-45B3-A12C-10B1C8F743D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE7F2A3F-0FBA-43BC-88BD-CC3744852525",
"versionEndExcluding": "58.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6EA77E-C999-462B-9605-878940771608",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA4EE31-4F98-4036-9FA7-965F7AD672D7",
"versionEndExcluding": "67.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0332FC06-B7B4-49CB-BACC-DEF2A8EEE0F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B22293E7-E22D-4DEF-AD5F-D32AE16DE98D",
"versionEndExcluding": "68.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7B6C70-5272-47B2-BC5F-B1F9DFCA7C42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AD4291-3782-491E-92C6-53F09EE1684A",
"versionEndExcluding": "61.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053A2DDD-5314-455D-8793-ADA8CEEDF7F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A7E308C-B348-45E8-86FA-841D3B65104A",
"versionEndExcluding": "61.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCD5A6F-DF0C-4C82-88BA-7CC5FE1EED2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A67E21D-4BD7-4EDE-BCC0-CC75BE91ED6A",
"versionEndExcluding": "62.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A83540-B071-4EE3-A98D-1BEE3C8FD3E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50869EEA-C324-4624-9B10-8C79E5598317",
"versionEndExcluding": "62.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73BF6B1C-15E4-4C01-A571-1E6FB737ECAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1794A6-C464-4D35-B1FE-60904349BD50",
"versionEndExcluding": "56.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A937272-E36B-420D-8407-D44C78ACEC65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0B729C-01EC-47E9-81AA-66A4F05A986B",
"versionEndExcluding": "57.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2112B6B-C983-4323-AAE5-364272C2C070",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A14506C-18DF-45E8-B407-5FB1BB454039",
"versionEndExcluding": "57.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3812A4B0-D2DA-4180-9AC8-FF547A501C0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F25AFA1-3701-4E91-BE88-AC755B9F7617",
"versionEndExcluding": "57.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD3D52F-B865-4217-8CF0-ACEABDB68378",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "379F02B6-817B-4250-A46D-2F17C123E8E6",
"versionEndExcluding": "70.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1A0557-4A74-45F7-8B98-447454BF8A58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DE5967-2045-4C72-88B9-A49F520F8D43",
"versionEndExcluding": "70.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4297DF3C-E132-4300-B891-9732EE003C3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c8000w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D609EA4F-631A-4BFF-A221-5C67F602F71E",
"versionEndExcluding": "72.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c8000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955EEB44-F267-4463-A7D0-462664EC0C85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94DCCD95-730E-4DA3-8775-D347942D3175",
"versionEndExcluding": "32.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C631EF-0AA0-4D06-868D-099862B5550A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE6E891-AC7F-4BB4-A06D-ED2B2A47466E",
"versionEndExcluding": "58.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FB9A38-795D-4D74-A1E9-CEBAC7502D1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B11F2D76-1081-4783-9820-9EF7D8653E90",
"versionEndExcluding": "58.65.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9FF2BE-5998-4795-8237-9111D47B7C18",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands."
},
{
"lang": "es",
"value": "Xerox Phaser 6510 versiones anteriores a 64.65.51 y 64.59.11 (Bridge), WorkCentre 6515 versiones anteriores a 65.65.51 y 65.59.11 (Bridge), VersaLink B400 versiones anteriores a 37.65.51 y 37.59.01 (Bridge), B405 versiones anteriores a 38.65.51 y 38.59 .01 (Bridge), B600/B610 versiones anteriores a 32.65.51 y 32.59.01 (Bridge), B605/B615 versiones anteriores a 33.65.51 y 33.59.01 (Bridge), B7025/30/35 versiones anteriores a 58.65.51 y 58.59.11 ( Bridge), C400 versiones anteriores a 67.65.51 y 67.59.01 (Bridge), C405 versiones anteriores a 68.65.51 y 68.59.01 (Bridge), C500/C600 versiones anteriores a 61.65.51 y 61.59.01 (Bridge), C505/C605 versiones anteriores a 62.65. 51 y 62.59.01 (Bridge), C7000 versiones anteriores a 56.65.51 y 56.59.01 (Bridge), C7020/25/30 versiones anteriores a 57.65.51 y 57.59.01 (Bridge), C8000/C9000 versiones anteriores a 70.65.51 y 70.59.01 (Bridge), C8000W versiones anteriores a 72.65.51, presentan una vulnerabilidad de ejecuci\u00f3n de comandos remota en la interfaz de usuario web que permite a atacantes remotos con \"a weaponized clone file\" ejecutar comandos arbitrarios"
}
],
"id": "CVE-2021-28671",
"lastModified": "2024-11-21T06:00:04.653",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-03-29T21:15:13.547",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-28673
Vulnerability from fkie_nvd - Published: 2021-03-29 20:15 - Updated: 2024-11-21 06:00
Severity ?
Summary
Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with "a weaponized clone file" to execute arbitrary commands in the Web User Interface.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5633F976-7DC2-4885-9E11-9AAC43AC6F4F",
"versionEndExcluding": "64.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA6DAC0-C2AF-4596-8083-FF2AD9850F5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "750494D1-9A26-4438-9314-73287CA902FE",
"versionEndExcluding": "65.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF327B8-0027-4782-9E70-9B1B761BB535",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF420769-56A8-4524-A9F3-2383903A3415",
"versionEndExcluding": "37.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6371B2E-7D30-4EE1-BA02-C80BAD217C80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BF5358-BCD6-45DC-8BFB-D2A4F8BAD483",
"versionEndExcluding": "38.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5919C7E6-3005-4737-AAD3-A6531C605DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A47E31-C28E-4F13-B61B-08E652D73B52",
"versionEndExcluding": "32.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C631EF-0AA0-4D06-868D-099862B5550A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44CAC202-CA06-462A-AFD8-C1C354C22E37",
"versionEndExcluding": "32.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1980B9F3-19AB-4815-8452-AE42821263ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5034A2-5C77-4A15-8FC9-09B55EC8B538",
"versionEndExcluding": "33.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80723C2-0840-4190-9089-DE15CC43278F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5023922A-C99E-47D0-8BBC-763D71EAF60E",
"versionEndExcluding": "33.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7A10DC-991A-45B3-A12C-10B1C8F743D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94323AC6-C591-4164-AC01-BFBB823BDF74",
"versionEndExcluding": "58.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6EA77E-C999-462B-9605-878940771608",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89DE11B7-F214-45C6-8D7B-2EEEE62779A8",
"versionEndExcluding": "58.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FB9A38-795D-4D74-A1E9-CEBAC7502D1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22707910-6725-4EEC-9141-5A6A1B9A72B7",
"versionEndExcluding": "58.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9FF2BE-5998-4795-8237-9111D47B7C18",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C86E3187-F1C3-450D-9AB0-53A7A70C010B",
"versionEndExcluding": "67.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0332FC06-B7B4-49CB-BACC-DEF2A8EEE0F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4D3C46-6C3A-48EB-A549-2EF2401534B1",
"versionEndExcluding": "68.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7B6C70-5272-47B2-BC5F-B1F9DFCA7C42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "570FE8D7-76FA-4228-B1CB-406262E6F526",
"versionEndExcluding": "61.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053A2DDD-5314-455D-8793-ADA8CEEDF7F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74B71E96-FD70-4178-9FBB-4CF715D5E97B",
"versionEndExcluding": "61.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCD5A6F-DF0C-4C82-88BA-7CC5FE1EED2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD79A2AB-0644-4068-A3C7-A3E17A6C741D",
"versionEndExcluding": "62.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A83540-B071-4EE3-A98D-1BEE3C8FD3E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F16FFDC-4BD7-4DA8-96E5-143BB11E23CA",
"versionEndExcluding": "62.59.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73BF6B1C-15E4-4C01-A571-1E6FB737ECAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2F8FB6-57E9-4090-8235-B13B4F71901A",
"versionEndExcluding": "56.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A937272-E36B-420D-8407-D44C78ACEC65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86FF6E4B-1AA6-4596-AA0D-1EB3EBF2B76C",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2112B6B-C983-4323-AAE5-364272C2C070",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C48BB6CD-C8A1-41C6-B3E6-7127FDC5DD83",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3812A4B0-D2DA-4180-9AC8-FF547A501C0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F88A9A3D-294C-4243-8B48-BA8FECFE5ECB",
"versionEndExcluding": "57.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD3D52F-B865-4217-8CF0-ACEABDB68378",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DF772C7-4B2B-45C1-A50A-71065AA20BCB",
"versionEndExcluding": "70.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1A0557-4A74-45F7-8B98-447454BF8A58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0DD467-6A5A-412C-87CC-44E06C6FC9D4",
"versionEndExcluding": "70.59.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4297DF3C-E132-4300-B891-9732EE003C3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A755766A-EE5A-4E5B-8448-C6474FF7FFCA",
"versionEndExcluding": "64.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA6DAC0-C2AF-4596-8083-FF2AD9850F5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84195A6F-DBC6-4C7A-86EF-6944E6DF7160",
"versionEndExcluding": "65.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF327B8-0027-4782-9E70-9B1B761BB535",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92CB9621-CC8D-4569-8D4F-7EE813A2AE6A",
"versionEndExcluding": "37.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6371B2E-7D30-4EE1-BA02-C80BAD217C80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F320B1A-5388-4587-A5ED-072F37FCD9D1",
"versionEndExcluding": "38.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5919C7E6-3005-4737-AAD3-A6531C605DC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "731CA570-FFD7-4DBA-BC6E-E6AFAEA5C6E3",
"versionEndExcluding": "32.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1980B9F3-19AB-4815-8452-AE42821263ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE28D21-8324-4019-9797-7ADE680366C7",
"versionEndExcluding": "33.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80723C2-0840-4190-9089-DE15CC43278F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57E18B31-80A0-4579-9B12-236118E9BAB8",
"versionEndExcluding": "33.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7A10DC-991A-45B3-A12C-10B1C8F743D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C86554C-D031-4339-9B8A-CECEFAC27477",
"versionEndExcluding": "58.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE6EA77E-C999-462B-9605-878940771608",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58DC7078-1462-47EB-A744-78E3E31A3D0F",
"versionEndExcluding": "67.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0332FC06-B7B4-49CB-BACC-DEF2A8EEE0F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70581112-C19E-44F1-B1BF-2E93C1E770E8",
"versionEndExcluding": "68.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7B6C70-5272-47B2-BC5F-B1F9DFCA7C42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A60F0DA0-1B80-4C7E-A001-3823E998BA34",
"versionEndExcluding": "61.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053A2DDD-5314-455D-8793-ADA8CEEDF7F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B834A75-9B12-4DAE-9FD4-13BC278192AF",
"versionEndExcluding": "61.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCD5A6F-DF0C-4C82-88BA-7CC5FE1EED2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1D3530-D0D0-4D0B-89E3-2451FC41E135",
"versionEndExcluding": "62.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43A83540-B071-4EE3-A98D-1BEE3C8FD3E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2A10AB-FC89-41CE-845B-D28DD3CB9CF1",
"versionEndExcluding": "62.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73BF6B1C-15E4-4C01-A571-1E6FB737ECAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43D3684D-4200-4DAA-9D81-D0EC2E9380E4",
"versionEndExcluding": "56.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A937272-E36B-420D-8407-D44C78ACEC65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6ADE62F9-35C7-4B9C-94E6-E68066D49B89",
"versionEndExcluding": "57.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2112B6B-C983-4323-AAE5-364272C2C070",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "935A4B2E-4C87-4EEB-8C21-0765967B9D97",
"versionEndExcluding": "57.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3812A4B0-D2DA-4180-9AC8-FF547A501C0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A382E35-9DCD-4A1A-A559-9F1E07D65C58",
"versionEndExcluding": "57.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD3D52F-B865-4217-8CF0-ACEABDB68378",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07311E12-51C3-4D63-ACB0-2BDBB967AE0C",
"versionEndExcluding": "70.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1A0557-4A74-45F7-8B98-447454BF8A58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15005DB7-8AFF-4765-ACAD-B5F4FD00D3CF",
"versionEndExcluding": "70.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4297DF3C-E132-4300-B891-9732EE003C3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF423B5-F23C-4611-82B6-8B3B5A9CA01C",
"versionEndExcluding": "32.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C631EF-0AA0-4D06-868D-099862B5550A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89DE11B7-F214-45C6-8D7B-2EEEE62779A8",
"versionEndExcluding": "58.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FB9A38-795D-4D74-A1E9-CEBAC7502D1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD91346-DD28-40D6-9BF7-0EB9BBB4B10C",
"versionEndExcluding": "58.61.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9FF2BE-5998-4795-8237-9111D47B7C18",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands in the Web User Interface."
},
{
"lang": "es",
"value": "Xerox Phaser 6510 versiones anteriores a 64.61.23 y 64.59.11 (Bridge), WorkCentre 6515 versiones anteriores a 65.61.23 y 65.59.11 (Bridge), VersaLink B400 versiones anteriores a 37.61.23 y 37.59.01 (Bridge), B405 versiones anteriores a 38.61.23 y 38.59 .01 (Bridge), B600/B610 versiones anteriores a 32.61.23 y 32.59.01 (Bridge), B605/B615 versiones anteriores a 33.61.23 y 33.59.01 (Bridge), B7025/30/35 versiones anteriores a 58.61.23 y 58.59.11 ( Bridge), C400 versiones anteriores a 67.61.23 y 67.59.01 (Bridge), C405 versiones anteriores a 68.61.23 y 68.59.01 (Bridge), C500/C600 versiones anteriores a 61.61.23 y 61.59.01 (Bridge), C505/C605 versiones anteriores a 62.61. 23 y 62.59.11 (Bridge), C7000 versiones anteriores a 56.61.23 y 56.59.01 (Bridge), C7020/25/30 versiones anteriores a 57.61.23 y 57.59.01 (Bridge), C8000/C9000 versiones anteriores a 70.61.23 y 70.59.01 (Bridge), permite a atacantes remotos con \"a weaponized clone file\" ejecutar comandos arbitrarios en la interfaz de usuario web"
}
],
"id": "CVE-2021-28673",
"lastModified": "2024-11-21T06:00:05.033",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-03-29T20:15:13.453",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-28671 (GCVE-0-2021-28671)
Vulnerability from cvelistv5 – Published: 2021-03-29 20:06 – Updated: 2024-08-03 21:47
VLAI?
Summary
Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with "a weaponized clone file" to execute arbitrary commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:47:33.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-29T20:06:50",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28671",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf",
"refsource": "CONFIRM",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-28671",
"datePublished": "2021-03-29T20:06:50",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-08-03T21:47:33.122Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-28672 (GCVE-0-2021-28672)
Vulnerability from cvelistv5 – Published: 2021-03-29 20:06 – Updated: 2024-08-03 21:47
VLAI?
Summary
Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:47:33.107Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-29T20:06:46",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28672",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf",
"refsource": "CONFIRM",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-28672",
"datePublished": "2021-03-29T20:06:46",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-08-03T21:47:33.107Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-28673 (GCVE-0-2021-28673)
Vulnerability from cvelistv5 – Published: 2021-03-29 19:00 – Updated: 2024-08-03 21:47
VLAI?
Summary
Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with "a weaponized clone file" to execute arbitrary commands in the Web User Interface.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:47:33.053Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands in the Web User Interface."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-29T19:59:12",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28673",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands in the Web User Interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf",
"refsource": "CONFIRM",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-28673",
"datePublished": "2021-03-29T19:00:49",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-08-03T21:47:33.053Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-28671 (GCVE-0-2021-28671)
Vulnerability from nvd – Published: 2021-03-29 20:06 – Updated: 2024-08-03 21:47
VLAI?
Summary
Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with "a weaponized clone file" to execute arbitrary commands.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:47:33.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-29T20:06:50",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28671",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf",
"refsource": "CONFIRM",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-28671",
"datePublished": "2021-03-29T20:06:50",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-08-03T21:47:33.122Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-28672 (GCVE-0-2021-28672)
Vulnerability from nvd – Published: 2021-03-29 20:06 – Updated: 2024-08-03 21:47
VLAI?
Summary
Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:47:33.107Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-29T20:06:46",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28672",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf",
"refsource": "CONFIRM",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX21D_for_PH6510_WC6515_VersaLink-1.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-28672",
"datePublished": "2021-03-29T20:06:46",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-08-03T21:47:33.107Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-28673 (GCVE-0-2021-28673)
Vulnerability from nvd – Published: 2021-03-29 19:00 – Updated: 2024-08-03 21:47
VLAI?
Summary
Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with "a weaponized clone file" to execute arbitrary commands in the Web User Interface.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T21:47:33.053Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands in the Web User Interface."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-29T19:59:12",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-28673",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with \"a weaponized clone file\" to execute arbitrary commands in the Web User Interface."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf",
"refsource": "CONFIRM",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2020/06/cert_Security_Mini_Bulletin_XRX20K_for_PH6510_WC6515_VLB4xx_C4xx_B6XX_B70xx_C5xx_C6xx_C7xxx.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-28673",
"datePublished": "2021-03-29T19:00:49",
"dateReserved": "2021-03-18T00:00:00",
"dateUpdated": "2024-08-03T21:47:33.053Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}