Search criteria

5 vulnerabilities by Fujifilm

CVE-2024-12782 (GCVE-0-2024-12782)

Vulnerability from cvelistv5 – Published: 2024-12-19 12:31 – Updated: 2025-02-28 06:36 Disputed
VLAI?
Title
Fujifilm Business Innovation Apeos C3070/Apeos C5570/Apeos C6580 Web Interface index.html#hashHome improper authorization
Summary
A vulnerability has been found in Fujifilm Business Innovation Apeos C3070, Apeos C5570 and Apeos C6580 up to 24.8.28 and classified as critical. This vulnerability affects unknown code of the file /home/index.html#hashHome of the component Web Interface. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains that "during technical verification it is not possible to reproduce any active actions like reboots which were mentioned in the original researcher disclosure."
CWE
  • CWE-285 - Improper Authorization
  • CWE-266 - Incorrect Privilege Assignment
Assigner
References
Impacted products
Vendor Product Version
Fujifilm Business Innovation Apeos C3070 Affected: 22.1.0
Affected: 22.1.1
Affected: 22.1.2
Affected: 22.1.3
Affected: 22.1.4
Affected: 22.1.5
Affected: 22.1.6
Affected: 22.1.7
Affected: 22.1.8
Affected: 22.1.9
Affected: 22.1.10
Affected: 22.1.11
Affected: 22.1.12
Affected: 22.1.13
Affected: 22.1.14
Affected: 22.1.15
Affected: 22.1.16
Affected: 22.1.17
Affected: 22.1.18
Affected: 22.1.19
Affected: 22.1.20
Affected: 22.1.21
Affected: 22.1.22
Affected: 22.1.23
Affected: 22.1.24
Affected: 22.1.25
Affected: 22.1.26
Affected: 22.1.27
Affected: 22.1.28
Affected: 22.12.0
Affected: 22.12.1
Affected: 22.12.2
Affected: 23.7.0
Affected: 23.7.1
Affected: 23.7.2
Affected: 23.7.3
Affected: 23.9.0
Affected: 23.9.1
Affected: 23.9.2
Affected: 23.9.3
Affected: 23.9.4
Affected: 23.9.5
Affected: 23.9.6
Affected: 23.9.7
Affected: 23.9.8
Affected: 23.9.9
Affected: 23.9.10
Affected: 23.9.11
Affected: 23.9.12
Affected: 23.9.13
Affected: 23.9.14
Affected: 23.9.15
Affected: 23.9.16
Affected: 23.12.0
Affected: 23.12.1
Affected: 23.12.2
Affected: 23.12.3
Affected: 23.12.4
Affected: 23.12.5
Affected: 23.12.6
Affected: 23.12.7
Affected: 23.12.8
Affected: 23.12.9
Affected: 23.12.10
Affected: 23.12.11
Affected: 23.12.12
Affected: 23.12.13
Affected: 23.12.14
Affected: 23.12.15
Affected: 24.2.0
Affected: 24.2.1
Affected: 24.2.2
Affected: 24.2.3
Affected: 24.2.4
Affected: 24.2.5
Affected: 24.2.6
Affected: 24.2.7
Affected: 24.2.8
Affected: 24.2.9
Affected: 24.2.10
Affected: 24.2.11
Affected: 24.2.12
Affected: 24.2.13
Affected: 24.2.14
Affected: 24.2.15
Affected: 24.5.0
Affected: 24.5.1
Affected: 24.8.0
Affected: 24.8.1
Affected: 24.8.2
Affected: 24.8.3
Affected: 24.8.4
Affected: 24.8.5
Affected: 24.8.6
Affected: 24.8.7
Affected: 24.8.8
Affected: 24.8.9
Affected: 24.8.10
Affected: 24.8.11
Affected: 24.8.12
Affected: 24.8.13
Affected: 24.8.14
Affected: 24.8.15
Affected: 24.8.16
Affected: 24.8.17
Affected: 24.8.18
Affected: 24.8.19
Affected: 24.8.20
Affected: 24.8.21
Affected: 24.8.22
Affected: 24.8.23
Affected: 24.8.24
Affected: 24.8.25
Affected: 24.8.26
Affected: 24.8.27
Affected: 24.8.28
Create a notification for this product.
    Fujifilm Business Innovation Apeos C5570 Affected: 22.1.0
Affected: 22.1.1
Affected: 22.1.2
Affected: 22.1.3
Affected: 22.1.4
Affected: 22.1.5
Affected: 22.1.6
Affected: 22.1.7
Affected: 22.1.8
Affected: 22.1.9
Affected: 22.1.10
Affected: 22.1.11
Affected: 22.1.12
Affected: 22.1.13
Affected: 22.1.14
Affected: 22.1.15
Affected: 22.1.16
Affected: 22.1.17
Affected: 22.1.18
Affected: 22.1.19
Affected: 22.1.20
Affected: 22.1.21
Affected: 22.1.22
Affected: 22.1.23
Affected: 22.1.24
Affected: 22.1.25
Affected: 22.1.26
Affected: 22.1.27
Affected: 22.1.28
Affected: 22.12.0
Affected: 22.12.1
Affected: 22.12.2
Affected: 23.7.0
Affected: 23.7.1
Affected: 23.7.2
Affected: 23.7.3
Affected: 23.9.0
Affected: 23.9.1
Affected: 23.9.2
Affected: 23.9.3
Affected: 23.9.4
Affected: 23.9.5
Affected: 23.9.6
Affected: 23.9.7
Affected: 23.9.8
Affected: 23.9.9
Affected: 23.9.10
Affected: 23.9.11
Affected: 23.9.12
Affected: 23.9.13
Affected: 23.9.14
Affected: 23.9.15
Affected: 23.9.16
Affected: 23.12.0
Affected: 23.12.1
Affected: 23.12.2
Affected: 23.12.3
Affected: 23.12.4
Affected: 23.12.5
Affected: 23.12.6
Affected: 23.12.7
Affected: 23.12.8
Affected: 23.12.9
Affected: 23.12.10
Affected: 23.12.11
Affected: 23.12.12
Affected: 23.12.13
Affected: 23.12.14
Affected: 23.12.15
Affected: 24.2.0
Affected: 24.2.1
Affected: 24.2.2
Affected: 24.2.3
Affected: 24.2.4
Affected: 24.2.5
Affected: 24.2.6
Affected: 24.2.7
Affected: 24.2.8
Affected: 24.2.9
Affected: 24.2.10
Affected: 24.2.11
Affected: 24.2.12
Affected: 24.2.13
Affected: 24.2.14
Affected: 24.2.15
Affected: 24.5.0
Affected: 24.5.1
Affected: 24.8.0
Affected: 24.8.1
Affected: 24.8.2
Affected: 24.8.3
Affected: 24.8.4
Affected: 24.8.5
Affected: 24.8.6
Affected: 24.8.7
Affected: 24.8.8
Affected: 24.8.9
Affected: 24.8.10
Affected: 24.8.11
Affected: 24.8.12
Affected: 24.8.13
Affected: 24.8.14
Affected: 24.8.15
Affected: 24.8.16
Affected: 24.8.17
Affected: 24.8.18
Affected: 24.8.19
Affected: 24.8.20
Affected: 24.8.21
Affected: 24.8.22
Affected: 24.8.23
Affected: 24.8.24
Affected: 24.8.25
Affected: 24.8.26
Affected: 24.8.27
Affected: 24.8.28
Create a notification for this product.
    Fujifilm Business Innovation Apeos C6580 Affected: 22.1.0
Affected: 22.1.1
Affected: 22.1.2
Affected: 22.1.3
Affected: 22.1.4
Affected: 22.1.5
Affected: 22.1.6
Affected: 22.1.7
Affected: 22.1.8
Affected: 22.1.9
Affected: 22.1.10
Affected: 22.1.11
Affected: 22.1.12
Affected: 22.1.13
Affected: 22.1.14
Affected: 22.1.15
Affected: 22.1.16
Affected: 22.1.17
Affected: 22.1.18
Affected: 22.1.19
Affected: 22.1.20
Affected: 22.1.21
Affected: 22.1.22
Affected: 22.1.23
Affected: 22.1.24
Affected: 22.1.25
Affected: 22.1.26
Affected: 22.1.27
Affected: 22.1.28
Affected: 22.12.0
Affected: 22.12.1
Affected: 22.12.2
Affected: 23.7.0
Affected: 23.7.1
Affected: 23.7.2
Affected: 23.7.3
Affected: 23.9.0
Affected: 23.9.1
Affected: 23.9.2
Affected: 23.9.3
Affected: 23.9.4
Affected: 23.9.5
Affected: 23.9.6
Affected: 23.9.7
Affected: 23.9.8
Affected: 23.9.9
Affected: 23.9.10
Affected: 23.9.11
Affected: 23.9.12
Affected: 23.9.13
Affected: 23.9.14
Affected: 23.9.15
Affected: 23.9.16
Affected: 23.12.0
Affected: 23.12.1
Affected: 23.12.2
Affected: 23.12.3
Affected: 23.12.4
Affected: 23.12.5
Affected: 23.12.6
Affected: 23.12.7
Affected: 23.12.8
Affected: 23.12.9
Affected: 23.12.10
Affected: 23.12.11
Affected: 23.12.12
Affected: 23.12.13
Affected: 23.12.14
Affected: 23.12.15
Affected: 24.2.0
Affected: 24.2.1
Affected: 24.2.2
Affected: 24.2.3
Affected: 24.2.4
Affected: 24.2.5
Affected: 24.2.6
Affected: 24.2.7
Affected: 24.2.8
Affected: 24.2.9
Affected: 24.2.10
Affected: 24.2.11
Affected: 24.2.12
Affected: 24.2.13
Affected: 24.2.14
Affected: 24.2.15
Affected: 24.5.0
Affected: 24.5.1
Affected: 24.8.0
Affected: 24.8.1
Affected: 24.8.2
Affected: 24.8.3
Affected: 24.8.4
Affected: 24.8.5
Affected: 24.8.6
Affected: 24.8.7
Affected: 24.8.8
Affected: 24.8.9
Affected: 24.8.10
Affected: 24.8.11
Affected: 24.8.12
Affected: 24.8.13
Affected: 24.8.14
Affected: 24.8.15
Affected: 24.8.16
Affected: 24.8.17
Affected: 24.8.18
Affected: 24.8.19
Affected: 24.8.20
Affected: 24.8.21
Affected: 24.8.22
Affected: 24.8.23
Affected: 24.8.24
Affected: 24.8.25
Affected: 24.8.26
Affected: 24.8.27
Affected: 24.8.28
Create a notification for this product.
Credits
dycc (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12782",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-20T21:56:55.579570Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-20T21:57:20.290Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Web Interface"
          ],
          "product": "Apeos C3070",
          "vendor": "Fujifilm Business Innovation",
          "versions": [
            {
              "status": "affected",
              "version": "22.1.0"
            },
            {
              "status": "affected",
              "version": "22.1.1"
            },
            {
              "status": "affected",
              "version": "22.1.2"
            },
            {
              "status": "affected",
              "version": "22.1.3"
            },
            {
              "status": "affected",
              "version": "22.1.4"
            },
            {
              "status": "affected",
              "version": "22.1.5"
            },
            {
              "status": "affected",
              "version": "22.1.6"
            },
            {
              "status": "affected",
              "version": "22.1.7"
            },
            {
              "status": "affected",
              "version": "22.1.8"
            },
            {
              "status": "affected",
              "version": "22.1.9"
            },
            {
              "status": "affected",
              "version": "22.1.10"
            },
            {
              "status": "affected",
              "version": "22.1.11"
            },
            {
              "status": "affected",
              "version": "22.1.12"
            },
            {
              "status": "affected",
              "version": "22.1.13"
            },
            {
              "status": "affected",
              "version": "22.1.14"
            },
            {
              "status": "affected",
              "version": "22.1.15"
            },
            {
              "status": "affected",
              "version": "22.1.16"
            },
            {
              "status": "affected",
              "version": "22.1.17"
            },
            {
              "status": "affected",
              "version": "22.1.18"
            },
            {
              "status": "affected",
              "version": "22.1.19"
            },
            {
              "status": "affected",
              "version": "22.1.20"
            },
            {
              "status": "affected",
              "version": "22.1.21"
            },
            {
              "status": "affected",
              "version": "22.1.22"
            },
            {
              "status": "affected",
              "version": "22.1.23"
            },
            {
              "status": "affected",
              "version": "22.1.24"
            },
            {
              "status": "affected",
              "version": "22.1.25"
            },
            {
              "status": "affected",
              "version": "22.1.26"
            },
            {
              "status": "affected",
              "version": "22.1.27"
            },
            {
              "status": "affected",
              "version": "22.1.28"
            },
            {
              "status": "affected",
              "version": "22.12.0"
            },
            {
              "status": "affected",
              "version": "22.12.1"
            },
            {
              "status": "affected",
              "version": "22.12.2"
            },
            {
              "status": "affected",
              "version": "23.7.0"
            },
            {
              "status": "affected",
              "version": "23.7.1"
            },
            {
              "status": "affected",
              "version": "23.7.2"
            },
            {
              "status": "affected",
              "version": "23.7.3"
            },
            {
              "status": "affected",
              "version": "23.9.0"
            },
            {
              "status": "affected",
              "version": "23.9.1"
            },
            {
              "status": "affected",
              "version": "23.9.2"
            },
            {
              "status": "affected",
              "version": "23.9.3"
            },
            {
              "status": "affected",
              "version": "23.9.4"
            },
            {
              "status": "affected",
              "version": "23.9.5"
            },
            {
              "status": "affected",
              "version": "23.9.6"
            },
            {
              "status": "affected",
              "version": "23.9.7"
            },
            {
              "status": "affected",
              "version": "23.9.8"
            },
            {
              "status": "affected",
              "version": "23.9.9"
            },
            {
              "status": "affected",
              "version": "23.9.10"
            },
            {
              "status": "affected",
              "version": "23.9.11"
            },
            {
              "status": "affected",
              "version": "23.9.12"
            },
            {
              "status": "affected",
              "version": "23.9.13"
            },
            {
              "status": "affected",
              "version": "23.9.14"
            },
            {
              "status": "affected",
              "version": "23.9.15"
            },
            {
              "status": "affected",
              "version": "23.9.16"
            },
            {
              "status": "affected",
              "version": "23.12.0"
            },
            {
              "status": "affected",
              "version": "23.12.1"
            },
            {
              "status": "affected",
              "version": "23.12.2"
            },
            {
              "status": "affected",
              "version": "23.12.3"
            },
            {
              "status": "affected",
              "version": "23.12.4"
            },
            {
              "status": "affected",
              "version": "23.12.5"
            },
            {
              "status": "affected",
              "version": "23.12.6"
            },
            {
              "status": "affected",
              "version": "23.12.7"
            },
            {
              "status": "affected",
              "version": "23.12.8"
            },
            {
              "status": "affected",
              "version": "23.12.9"
            },
            {
              "status": "affected",
              "version": "23.12.10"
            },
            {
              "status": "affected",
              "version": "23.12.11"
            },
            {
              "status": "affected",
              "version": "23.12.12"
            },
            {
              "status": "affected",
              "version": "23.12.13"
            },
            {
              "status": "affected",
              "version": "23.12.14"
            },
            {
              "status": "affected",
              "version": "23.12.15"
            },
            {
              "status": "affected",
              "version": "24.2.0"
            },
            {
              "status": "affected",
              "version": "24.2.1"
            },
            {
              "status": "affected",
              "version": "24.2.2"
            },
            {
              "status": "affected",
              "version": "24.2.3"
            },
            {
              "status": "affected",
              "version": "24.2.4"
            },
            {
              "status": "affected",
              "version": "24.2.5"
            },
            {
              "status": "affected",
              "version": "24.2.6"
            },
            {
              "status": "affected",
              "version": "24.2.7"
            },
            {
              "status": "affected",
              "version": "24.2.8"
            },
            {
              "status": "affected",
              "version": "24.2.9"
            },
            {
              "status": "affected",
              "version": "24.2.10"
            },
            {
              "status": "affected",
              "version": "24.2.11"
            },
            {
              "status": "affected",
              "version": "24.2.12"
            },
            {
              "status": "affected",
              "version": "24.2.13"
            },
            {
              "status": "affected",
              "version": "24.2.14"
            },
            {
              "status": "affected",
              "version": "24.2.15"
            },
            {
              "status": "affected",
              "version": "24.5.0"
            },
            {
              "status": "affected",
              "version": "24.5.1"
            },
            {
              "status": "affected",
              "version": "24.8.0"
            },
            {
              "status": "affected",
              "version": "24.8.1"
            },
            {
              "status": "affected",
              "version": "24.8.2"
            },
            {
              "status": "affected",
              "version": "24.8.3"
            },
            {
              "status": "affected",
              "version": "24.8.4"
            },
            {
              "status": "affected",
              "version": "24.8.5"
            },
            {
              "status": "affected",
              "version": "24.8.6"
            },
            {
              "status": "affected",
              "version": "24.8.7"
            },
            {
              "status": "affected",
              "version": "24.8.8"
            },
            {
              "status": "affected",
              "version": "24.8.9"
            },
            {
              "status": "affected",
              "version": "24.8.10"
            },
            {
              "status": "affected",
              "version": "24.8.11"
            },
            {
              "status": "affected",
              "version": "24.8.12"
            },
            {
              "status": "affected",
              "version": "24.8.13"
            },
            {
              "status": "affected",
              "version": "24.8.14"
            },
            {
              "status": "affected",
              "version": "24.8.15"
            },
            {
              "status": "affected",
              "version": "24.8.16"
            },
            {
              "status": "affected",
              "version": "24.8.17"
            },
            {
              "status": "affected",
              "version": "24.8.18"
            },
            {
              "status": "affected",
              "version": "24.8.19"
            },
            {
              "status": "affected",
              "version": "24.8.20"
            },
            {
              "status": "affected",
              "version": "24.8.21"
            },
            {
              "status": "affected",
              "version": "24.8.22"
            },
            {
              "status": "affected",
              "version": "24.8.23"
            },
            {
              "status": "affected",
              "version": "24.8.24"
            },
            {
              "status": "affected",
              "version": "24.8.25"
            },
            {
              "status": "affected",
              "version": "24.8.26"
            },
            {
              "status": "affected",
              "version": "24.8.27"
            },
            {
              "status": "affected",
              "version": "24.8.28"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "Apeos C5570",
          "vendor": "Fujifilm Business Innovation",
          "versions": [
            {
              "status": "affected",
              "version": "22.1.0"
            },
            {
              "status": "affected",
              "version": "22.1.1"
            },
            {
              "status": "affected",
              "version": "22.1.2"
            },
            {
              "status": "affected",
              "version": "22.1.3"
            },
            {
              "status": "affected",
              "version": "22.1.4"
            },
            {
              "status": "affected",
              "version": "22.1.5"
            },
            {
              "status": "affected",
              "version": "22.1.6"
            },
            {
              "status": "affected",
              "version": "22.1.7"
            },
            {
              "status": "affected",
              "version": "22.1.8"
            },
            {
              "status": "affected",
              "version": "22.1.9"
            },
            {
              "status": "affected",
              "version": "22.1.10"
            },
            {
              "status": "affected",
              "version": "22.1.11"
            },
            {
              "status": "affected",
              "version": "22.1.12"
            },
            {
              "status": "affected",
              "version": "22.1.13"
            },
            {
              "status": "affected",
              "version": "22.1.14"
            },
            {
              "status": "affected",
              "version": "22.1.15"
            },
            {
              "status": "affected",
              "version": "22.1.16"
            },
            {
              "status": "affected",
              "version": "22.1.17"
            },
            {
              "status": "affected",
              "version": "22.1.18"
            },
            {
              "status": "affected",
              "version": "22.1.19"
            },
            {
              "status": "affected",
              "version": "22.1.20"
            },
            {
              "status": "affected",
              "version": "22.1.21"
            },
            {
              "status": "affected",
              "version": "22.1.22"
            },
            {
              "status": "affected",
              "version": "22.1.23"
            },
            {
              "status": "affected",
              "version": "22.1.24"
            },
            {
              "status": "affected",
              "version": "22.1.25"
            },
            {
              "status": "affected",
              "version": "22.1.26"
            },
            {
              "status": "affected",
              "version": "22.1.27"
            },
            {
              "status": "affected",
              "version": "22.1.28"
            },
            {
              "status": "affected",
              "version": "22.12.0"
            },
            {
              "status": "affected",
              "version": "22.12.1"
            },
            {
              "status": "affected",
              "version": "22.12.2"
            },
            {
              "status": "affected",
              "version": "23.7.0"
            },
            {
              "status": "affected",
              "version": "23.7.1"
            },
            {
              "status": "affected",
              "version": "23.7.2"
            },
            {
              "status": "affected",
              "version": "23.7.3"
            },
            {
              "status": "affected",
              "version": "23.9.0"
            },
            {
              "status": "affected",
              "version": "23.9.1"
            },
            {
              "status": "affected",
              "version": "23.9.2"
            },
            {
              "status": "affected",
              "version": "23.9.3"
            },
            {
              "status": "affected",
              "version": "23.9.4"
            },
            {
              "status": "affected",
              "version": "23.9.5"
            },
            {
              "status": "affected",
              "version": "23.9.6"
            },
            {
              "status": "affected",
              "version": "23.9.7"
            },
            {
              "status": "affected",
              "version": "23.9.8"
            },
            {
              "status": "affected",
              "version": "23.9.9"
            },
            {
              "status": "affected",
              "version": "23.9.10"
            },
            {
              "status": "affected",
              "version": "23.9.11"
            },
            {
              "status": "affected",
              "version": "23.9.12"
            },
            {
              "status": "affected",
              "version": "23.9.13"
            },
            {
              "status": "affected",
              "version": "23.9.14"
            },
            {
              "status": "affected",
              "version": "23.9.15"
            },
            {
              "status": "affected",
              "version": "23.9.16"
            },
            {
              "status": "affected",
              "version": "23.12.0"
            },
            {
              "status": "affected",
              "version": "23.12.1"
            },
            {
              "status": "affected",
              "version": "23.12.2"
            },
            {
              "status": "affected",
              "version": "23.12.3"
            },
            {
              "status": "affected",
              "version": "23.12.4"
            },
            {
              "status": "affected",
              "version": "23.12.5"
            },
            {
              "status": "affected",
              "version": "23.12.6"
            },
            {
              "status": "affected",
              "version": "23.12.7"
            },
            {
              "status": "affected",
              "version": "23.12.8"
            },
            {
              "status": "affected",
              "version": "23.12.9"
            },
            {
              "status": "affected",
              "version": "23.12.10"
            },
            {
              "status": "affected",
              "version": "23.12.11"
            },
            {
              "status": "affected",
              "version": "23.12.12"
            },
            {
              "status": "affected",
              "version": "23.12.13"
            },
            {
              "status": "affected",
              "version": "23.12.14"
            },
            {
              "status": "affected",
              "version": "23.12.15"
            },
            {
              "status": "affected",
              "version": "24.2.0"
            },
            {
              "status": "affected",
              "version": "24.2.1"
            },
            {
              "status": "affected",
              "version": "24.2.2"
            },
            {
              "status": "affected",
              "version": "24.2.3"
            },
            {
              "status": "affected",
              "version": "24.2.4"
            },
            {
              "status": "affected",
              "version": "24.2.5"
            },
            {
              "status": "affected",
              "version": "24.2.6"
            },
            {
              "status": "affected",
              "version": "24.2.7"
            },
            {
              "status": "affected",
              "version": "24.2.8"
            },
            {
              "status": "affected",
              "version": "24.2.9"
            },
            {
              "status": "affected",
              "version": "24.2.10"
            },
            {
              "status": "affected",
              "version": "24.2.11"
            },
            {
              "status": "affected",
              "version": "24.2.12"
            },
            {
              "status": "affected",
              "version": "24.2.13"
            },
            {
              "status": "affected",
              "version": "24.2.14"
            },
            {
              "status": "affected",
              "version": "24.2.15"
            },
            {
              "status": "affected",
              "version": "24.5.0"
            },
            {
              "status": "affected",
              "version": "24.5.1"
            },
            {
              "status": "affected",
              "version": "24.8.0"
            },
            {
              "status": "affected",
              "version": "24.8.1"
            },
            {
              "status": "affected",
              "version": "24.8.2"
            },
            {
              "status": "affected",
              "version": "24.8.3"
            },
            {
              "status": "affected",
              "version": "24.8.4"
            },
            {
              "status": "affected",
              "version": "24.8.5"
            },
            {
              "status": "affected",
              "version": "24.8.6"
            },
            {
              "status": "affected",
              "version": "24.8.7"
            },
            {
              "status": "affected",
              "version": "24.8.8"
            },
            {
              "status": "affected",
              "version": "24.8.9"
            },
            {
              "status": "affected",
              "version": "24.8.10"
            },
            {
              "status": "affected",
              "version": "24.8.11"
            },
            {
              "status": "affected",
              "version": "24.8.12"
            },
            {
              "status": "affected",
              "version": "24.8.13"
            },
            {
              "status": "affected",
              "version": "24.8.14"
            },
            {
              "status": "affected",
              "version": "24.8.15"
            },
            {
              "status": "affected",
              "version": "24.8.16"
            },
            {
              "status": "affected",
              "version": "24.8.17"
            },
            {
              "status": "affected",
              "version": "24.8.18"
            },
            {
              "status": "affected",
              "version": "24.8.19"
            },
            {
              "status": "affected",
              "version": "24.8.20"
            },
            {
              "status": "affected",
              "version": "24.8.21"
            },
            {
              "status": "affected",
              "version": "24.8.22"
            },
            {
              "status": "affected",
              "version": "24.8.23"
            },
            {
              "status": "affected",
              "version": "24.8.24"
            },
            {
              "status": "affected",
              "version": "24.8.25"
            },
            {
              "status": "affected",
              "version": "24.8.26"
            },
            {
              "status": "affected",
              "version": "24.8.27"
            },
            {
              "status": "affected",
              "version": "24.8.28"
            }
          ]
        },
        {
          "modules": [
            "Web Interface"
          ],
          "product": "Apeos C6580",
          "vendor": "Fujifilm Business Innovation",
          "versions": [
            {
              "status": "affected",
              "version": "22.1.0"
            },
            {
              "status": "affected",
              "version": "22.1.1"
            },
            {
              "status": "affected",
              "version": "22.1.2"
            },
            {
              "status": "affected",
              "version": "22.1.3"
            },
            {
              "status": "affected",
              "version": "22.1.4"
            },
            {
              "status": "affected",
              "version": "22.1.5"
            },
            {
              "status": "affected",
              "version": "22.1.6"
            },
            {
              "status": "affected",
              "version": "22.1.7"
            },
            {
              "status": "affected",
              "version": "22.1.8"
            },
            {
              "status": "affected",
              "version": "22.1.9"
            },
            {
              "status": "affected",
              "version": "22.1.10"
            },
            {
              "status": "affected",
              "version": "22.1.11"
            },
            {
              "status": "affected",
              "version": "22.1.12"
            },
            {
              "status": "affected",
              "version": "22.1.13"
            },
            {
              "status": "affected",
              "version": "22.1.14"
            },
            {
              "status": "affected",
              "version": "22.1.15"
            },
            {
              "status": "affected",
              "version": "22.1.16"
            },
            {
              "status": "affected",
              "version": "22.1.17"
            },
            {
              "status": "affected",
              "version": "22.1.18"
            },
            {
              "status": "affected",
              "version": "22.1.19"
            },
            {
              "status": "affected",
              "version": "22.1.20"
            },
            {
              "status": "affected",
              "version": "22.1.21"
            },
            {
              "status": "affected",
              "version": "22.1.22"
            },
            {
              "status": "affected",
              "version": "22.1.23"
            },
            {
              "status": "affected",
              "version": "22.1.24"
            },
            {
              "status": "affected",
              "version": "22.1.25"
            },
            {
              "status": "affected",
              "version": "22.1.26"
            },
            {
              "status": "affected",
              "version": "22.1.27"
            },
            {
              "status": "affected",
              "version": "22.1.28"
            },
            {
              "status": "affected",
              "version": "22.12.0"
            },
            {
              "status": "affected",
              "version": "22.12.1"
            },
            {
              "status": "affected",
              "version": "22.12.2"
            },
            {
              "status": "affected",
              "version": "23.7.0"
            },
            {
              "status": "affected",
              "version": "23.7.1"
            },
            {
              "status": "affected",
              "version": "23.7.2"
            },
            {
              "status": "affected",
              "version": "23.7.3"
            },
            {
              "status": "affected",
              "version": "23.9.0"
            },
            {
              "status": "affected",
              "version": "23.9.1"
            },
            {
              "status": "affected",
              "version": "23.9.2"
            },
            {
              "status": "affected",
              "version": "23.9.3"
            },
            {
              "status": "affected",
              "version": "23.9.4"
            },
            {
              "status": "affected",
              "version": "23.9.5"
            },
            {
              "status": "affected",
              "version": "23.9.6"
            },
            {
              "status": "affected",
              "version": "23.9.7"
            },
            {
              "status": "affected",
              "version": "23.9.8"
            },
            {
              "status": "affected",
              "version": "23.9.9"
            },
            {
              "status": "affected",
              "version": "23.9.10"
            },
            {
              "status": "affected",
              "version": "23.9.11"
            },
            {
              "status": "affected",
              "version": "23.9.12"
            },
            {
              "status": "affected",
              "version": "23.9.13"
            },
            {
              "status": "affected",
              "version": "23.9.14"
            },
            {
              "status": "affected",
              "version": "23.9.15"
            },
            {
              "status": "affected",
              "version": "23.9.16"
            },
            {
              "status": "affected",
              "version": "23.12.0"
            },
            {
              "status": "affected",
              "version": "23.12.1"
            },
            {
              "status": "affected",
              "version": "23.12.2"
            },
            {
              "status": "affected",
              "version": "23.12.3"
            },
            {
              "status": "affected",
              "version": "23.12.4"
            },
            {
              "status": "affected",
              "version": "23.12.5"
            },
            {
              "status": "affected",
              "version": "23.12.6"
            },
            {
              "status": "affected",
              "version": "23.12.7"
            },
            {
              "status": "affected",
              "version": "23.12.8"
            },
            {
              "status": "affected",
              "version": "23.12.9"
            },
            {
              "status": "affected",
              "version": "23.12.10"
            },
            {
              "status": "affected",
              "version": "23.12.11"
            },
            {
              "status": "affected",
              "version": "23.12.12"
            },
            {
              "status": "affected",
              "version": "23.12.13"
            },
            {
              "status": "affected",
              "version": "23.12.14"
            },
            {
              "status": "affected",
              "version": "23.12.15"
            },
            {
              "status": "affected",
              "version": "24.2.0"
            },
            {
              "status": "affected",
              "version": "24.2.1"
            },
            {
              "status": "affected",
              "version": "24.2.2"
            },
            {
              "status": "affected",
              "version": "24.2.3"
            },
            {
              "status": "affected",
              "version": "24.2.4"
            },
            {
              "status": "affected",
              "version": "24.2.5"
            },
            {
              "status": "affected",
              "version": "24.2.6"
            },
            {
              "status": "affected",
              "version": "24.2.7"
            },
            {
              "status": "affected",
              "version": "24.2.8"
            },
            {
              "status": "affected",
              "version": "24.2.9"
            },
            {
              "status": "affected",
              "version": "24.2.10"
            },
            {
              "status": "affected",
              "version": "24.2.11"
            },
            {
              "status": "affected",
              "version": "24.2.12"
            },
            {
              "status": "affected",
              "version": "24.2.13"
            },
            {
              "status": "affected",
              "version": "24.2.14"
            },
            {
              "status": "affected",
              "version": "24.2.15"
            },
            {
              "status": "affected",
              "version": "24.5.0"
            },
            {
              "status": "affected",
              "version": "24.5.1"
            },
            {
              "status": "affected",
              "version": "24.8.0"
            },
            {
              "status": "affected",
              "version": "24.8.1"
            },
            {
              "status": "affected",
              "version": "24.8.2"
            },
            {
              "status": "affected",
              "version": "24.8.3"
            },
            {
              "status": "affected",
              "version": "24.8.4"
            },
            {
              "status": "affected",
              "version": "24.8.5"
            },
            {
              "status": "affected",
              "version": "24.8.6"
            },
            {
              "status": "affected",
              "version": "24.8.7"
            },
            {
              "status": "affected",
              "version": "24.8.8"
            },
            {
              "status": "affected",
              "version": "24.8.9"
            },
            {
              "status": "affected",
              "version": "24.8.10"
            },
            {
              "status": "affected",
              "version": "24.8.11"
            },
            {
              "status": "affected",
              "version": "24.8.12"
            },
            {
              "status": "affected",
              "version": "24.8.13"
            },
            {
              "status": "affected",
              "version": "24.8.14"
            },
            {
              "status": "affected",
              "version": "24.8.15"
            },
            {
              "status": "affected",
              "version": "24.8.16"
            },
            {
              "status": "affected",
              "version": "24.8.17"
            },
            {
              "status": "affected",
              "version": "24.8.18"
            },
            {
              "status": "affected",
              "version": "24.8.19"
            },
            {
              "status": "affected",
              "version": "24.8.20"
            },
            {
              "status": "affected",
              "version": "24.8.21"
            },
            {
              "status": "affected",
              "version": "24.8.22"
            },
            {
              "status": "affected",
              "version": "24.8.23"
            },
            {
              "status": "affected",
              "version": "24.8.24"
            },
            {
              "status": "affected",
              "version": "24.8.25"
            },
            {
              "status": "affected",
              "version": "24.8.26"
            },
            {
              "status": "affected",
              "version": "24.8.27"
            },
            {
              "status": "affected",
              "version": "24.8.28"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "dycc (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in Fujifilm Business Innovation Apeos C3070, Apeos C5570 and Apeos C6580 up to 24.8.28 and classified as critical. This vulnerability affects unknown code of the file /home/index.html#hashHome of the component Web Interface. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains that \"during technical verification it is not possible to reproduce any active actions like reboots which were mentioned in the original researcher disclosure.\""
        },
        {
          "lang": "de",
          "value": "In Fujifilm Business Innovation Apeos C3070, Apeos C5570 and Apeos C6580 bis 24.8.28 wurde eine kritische Schwachstelle gefunden. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /home/index.html#hashHome der Komponente Web Interface. Durch Beeinflussen mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Zur Zeit ist nicht genau klar, ob diese Schwachstelle in der besagten Form wirklich existiert."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 7.5,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-266",
              "description": "Incorrect Privilege Assignment",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-28T06:36:15.948Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-288958 | Fujifilm Business Innovation Apeos C3070/Apeos C5570/Apeos C6580 Web Interface index.html#hashHome improper authorization",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.288958"
        },
        {
          "name": "VDB-288958 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.288958"
        },
        {
          "name": "Submit #458897 | Fujifilm Business Innovation (China) Co., Ltd. Apeos C3070, Apeos C6580, Apeos C5570 printers Apeos C3070, Apeos C6580, Apeos C5570 unauthorized access",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.458897"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2024/1226_announce.html"
        }
      ],
      "tags": [
        "disputed"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-12-19T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-12-19T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-02-28T07:40:24.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Fujifilm Business Innovation Apeos C3070/Apeos C5570/Apeos C6580 Web Interface index.html#hashHome improper authorization"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-12782",
    "datePublished": "2024-12-19T12:31:07.155Z",
    "dateReserved": "2024-12-19T07:19:32.765Z",
    "dateUpdated": "2025-02-28T06:36:15.948Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-43460 (GCVE-0-2022-43460)

Vulnerability from cvelistv5 – Published: 2023-02-13 00:00 – Updated: 2025-03-21 18:34
VLAI?
Summary
Driver Distributor v2.2.3.1 and earlier contains a vulnerability where passwords are stored in a recoverable format. If an attacker obtains a configuration file of Driver Distributor, the encrypted administrator's credentials may be decrypted.
CWE
  • Storing passwords in a recoverable format
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:32:58.857Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2023/0131_announce.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN22830348/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-43460",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-21T18:33:49.667259Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-522",
                "description": "CWE-522 Insufficiently Protected Credentials",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-21T18:34:23.542Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Driver Distributor",
          "vendor": "FUJIFILM Business Innovation Corp.",
          "versions": [
            {
              "status": "affected",
              "version": "v2.2.3.1 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Driver Distributor v2.2.3.1 and earlier contains a vulnerability where passwords are stored in a recoverable format. If an attacker obtains a configuration file of Driver Distributor, the encrypted administrator\u0027s credentials may be decrypted."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Storing passwords in a recoverable format",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-02-13T00:00:00.000Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://www.fujifilm.com/fbglobal/eng/company/news/notice/2023/0131_announce.html"
        },
        {
          "url": "https://jvn.jp/en/jp/JVN22830348/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2022-43460",
    "datePublished": "2023-02-13T00:00:00.000Z",
    "dateReserved": "2022-12-09T00:00:00.000Z",
    "dateUpdated": "2025-03-21T18:34:23.542Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-10950 (GCVE-0-2019-10950)

Vulnerability from cvelistv5 – Published: 2019-04-30 16:44 – Updated: 2024-08-04 22:40
VLAI?
Summary
Fujifilm FCR Capsula X/ Carbon X/ FCR XC-2, model versions CR-IR 357 FCR Carbon X, CR-IR 357 FCR XC-2, FCR-IR 357 FCR Capsula X provide insecure telnet services that lack authentication requirements. An attacker who successfully exploits this vulnerability may be able to access the underlying operating system.
Severity ?
No CVSS data available.
CWE
  • CWE-284 - IMPROPER ACCESS CONTROL CWE-284
Assigner
References
Impacted products
Vendor Product Version
Fujifilm Fujifilm FCR Capsula X/ Carbon X Affected: CR-IR 357 FCR Carbon X
Affected: CR-IR 357 FCR XC-2
Affected: FCR-IR 357 FCR Capsula X
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:40:15.366Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-113-01"
          },
          {
            "name": "108052",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108052"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Fujifilm FCR Capsula X/ Carbon X",
          "vendor": "Fujifilm",
          "versions": [
            {
              "status": "affected",
              "version": "CR-IR 357 FCR Carbon X"
            },
            {
              "status": "affected",
              "version": "CR-IR 357 FCR XC-2"
            },
            {
              "status": "affected",
              "version": "FCR-IR 357 FCR Capsula X"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Fujifilm FCR Capsula X/ Carbon X/ FCR XC-2, model versions CR-IR 357 FCR Carbon X, CR-IR 357 FCR XC-2, FCR-IR 357 FCR Capsula X provide insecure telnet services that lack authentication requirements. An attacker who successfully exploits this vulnerability may be able to access the underlying operating system."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "IMPROPER ACCESS CONTROL CWE-284",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-04-30T16:44:44",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-113-01"
        },
        {
          "name": "108052",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108052"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2019-10950",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Fujifilm FCR Capsula X/ Carbon X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "CR-IR 357 FCR Carbon X"
                          },
                          {
                            "version_value": "CR-IR 357 FCR XC-2"
                          },
                          {
                            "version_value": "FCR-IR 357 FCR Capsula X"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Fujifilm"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Fujifilm FCR Capsula X/ Carbon X/ FCR XC-2, model versions CR-IR 357 FCR Carbon X, CR-IR 357 FCR XC-2, FCR-IR 357 FCR Capsula X provide insecure telnet services that lack authentication requirements. An attacker who successfully exploits this vulnerability may be able to access the underlying operating system."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER ACCESS CONTROL CWE-284"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-113-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-113-01"
            },
            {
              "name": "108052",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108052"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2019-10950",
    "datePublished": "2019-04-30T16:44:35",
    "dateReserved": "2019-04-08T00:00:00",
    "dateUpdated": "2024-08-04T22:40:15.366Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-10948 (GCVE-0-2019-10948)

Vulnerability from cvelistv5 – Published: 2019-04-30 16:41 – Updated: 2024-08-04 22:40
VLAI?
Summary
Fujifilm FCR Capsula X/ Carbon X/ FCR XC-2, model versions CR-IR 357 FCR Carbon X, CR-IR 357 FCR XC-2, FCR-IR 357 FCR Capsula X are susceptible to a denial-of-service condition as a result of an overflow of TCP packets, which requires the device to be manually rebooted.
Severity ?
No CVSS data available.
CWE
  • CWE-400 - UNCONTROLLED RESOURCE CONSUMPTION CWE-400
Assigner
References
Impacted products
Vendor Product Version
Fujifilm Fujifilm FCR Capsula X/ Carbon X Affected: CR-IR 357 FCR Carbon X
Affected: CR-IR 357 FCR XC-2
Affected: FCR-IR 357 FCR Capsula X
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:40:15.443Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-113-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Fujifilm FCR Capsula X/ Carbon X",
          "vendor": "Fujifilm",
          "versions": [
            {
              "status": "affected",
              "version": "CR-IR 357 FCR Carbon X"
            },
            {
              "status": "affected",
              "version": "CR-IR 357 FCR XC-2"
            },
            {
              "status": "affected",
              "version": "FCR-IR 357 FCR Capsula X"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Fujifilm FCR Capsula X/ Carbon X/ FCR XC-2, model versions CR-IR 357 FCR Carbon X, CR-IR 357 FCR XC-2, FCR-IR 357 FCR Capsula X are susceptible to a denial-of-service condition as a result of an overflow of TCP packets, which requires the device to be manually rebooted."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "UNCONTROLLED RESOURCE CONSUMPTION CWE-400",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-04-30T16:41:37",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-113-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2019-10948",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Fujifilm FCR Capsula X/ Carbon X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "CR-IR 357 FCR Carbon X"
                          },
                          {
                            "version_value": "CR-IR 357 FCR XC-2"
                          },
                          {
                            "version_value": "FCR-IR 357 FCR Capsula X"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Fujifilm"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Fujifilm FCR Capsula X/ Carbon X/ FCR XC-2, model versions CR-IR 357 FCR Carbon X, CR-IR 357 FCR XC-2, FCR-IR 357 FCR Capsula X are susceptible to a denial-of-service condition as a result of an overflow of TCP packets, which requires the device to be manually rebooted."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "UNCONTROLLED RESOURCE CONSUMPTION CWE-400"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-113-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-19-113-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2019-10948",
    "datePublished": "2019-04-30T16:41:37",
    "dateReserved": "2019-04-08T00:00:00",
    "dateUpdated": "2024-08-04T22:40:15.443Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10850 (GCVE-0-2017-10850)

Vulnerability from cvelistv5 – Published: 2017-09-01 14:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
Untrusted search path vulnerability in Installers of ART EX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 12 Apr 2017 02:04 UTC.), PostScript? Driver + Additional Feature Plug-in + PPD File for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 12 Apr 2017 02:10 UTC.), XPS Print Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 3 Nov 2017 23:48 UTC.), ART EX Direct FAX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 26 May 2017 07:44 UTC.), Setting Restore Tool for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 25 Aug 2015 08:51 UTC.) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Severity ?
No CVSS data available.
CWE
  • Untrusted search path vulnerability
Assigner
References
Impacted products
Vendor Product Version
Fuji Xerox Co.,Ltd. Installer of ART EX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 12 Apr 2017 02:04 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of ART EX Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 12 Apr 2017 02:04 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of PostScript? Driver + Additional Feature Plug-in + PPD File for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 12 Apr 2017 02:10 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of PostScript? Driver + Additional Feature Plug-in + PPD File for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 12 Apr 2017 02:10 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of XPS Print Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 3 Nov 2017 23:48 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of XPS Print Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 3 Nov 2017 23:48 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of ART EX Direct FAX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 26 May 2017 07:44 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of ART EX Direct FAX Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 26 May 2017 07:44 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of Setting Restore Tool for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 25 Aug 2015 08:51 UTC
Create a notification for this product.
    Fuji Xerox Co.,Ltd. Installer of Setting Restore Tool for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 Affected: Timestamp of code signing is before 25 Aug 2015 08:51 UTC
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.585Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#09769017",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN09769017/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fujixerox.co.jp/company/news/notice/2017/0831_rectification_work.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Installer of ART EX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 12 Apr 2017 02:04 UTC"
            }
          ]
        },
        {
          "product": "Installer of ART EX Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 12 Apr 2017 02:04 UTC"
            }
          ]
        },
        {
          "product": "Installer of PostScript? Driver + Additional Feature Plug-in + PPD File for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 12 Apr 2017 02:10 UTC"
            }
          ]
        },
        {
          "product": "Installer of PostScript? Driver + Additional Feature Plug-in + PPD File for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 12 Apr 2017 02:10 UTC"
            }
          ]
        },
        {
          "product": "Installer of XPS Print Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 3 Nov 2017 23:48 UTC"
            }
          ]
        },
        {
          "product": "Installer of XPS Print Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 3 Nov 2017 23:48 UTC"
            }
          ]
        },
        {
          "product": "Installer of ART EX Direct FAX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 26 May 2017 07:44 UTC"
            }
          ]
        },
        {
          "product": "Installer of ART EX Direct FAX Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 26 May 2017 07:44 UTC"
            }
          ]
        },
        {
          "product": "Installer of Setting Restore Tool for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 25 Aug 2015 08:51 UTC"
            }
          ]
        },
        {
          "product": "Installer of Setting Restore Tool for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
          "vendor": "Fuji Xerox Co.,Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "Timestamp of code signing is before 25 Aug 2015 08:51 UTC"
            }
          ]
        }
      ],
      "datePublic": "2017-08-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Untrusted search path vulnerability in Installers of ART EX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 12 Apr 2017 02:04 UTC.), PostScript? Driver + Additional Feature Plug-in + PPD File for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 12 Apr 2017 02:10 UTC.), XPS Print Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 3 Nov 2017 23:48 UTC.), ART EX Direct FAX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 26 May 2017 07:44 UTC.), Setting Restore Tool for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 25 Aug 2015 08:51 UTC.) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Untrusted search path vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-01T13:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#09769017",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN09769017/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fujixerox.co.jp/company/news/notice/2017/0831_rectification_work.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10850",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Installer of ART EX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 12 Apr 2017 02:04 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of ART EX Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 12 Apr 2017 02:04 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of PostScript? Driver + Additional Feature Plug-in + PPD File for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 12 Apr 2017 02:10 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of PostScript? Driver + Additional Feature Plug-in + PPD File for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 12 Apr 2017 02:10 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of XPS Print Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 3 Nov 2017 23:48 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of XPS Print Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 3 Nov 2017 23:48 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of ART EX Direct FAX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 26 May 2017 07:44 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of ART EX Direct FAX Driver for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 26 May 2017 07:44 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of Setting Restore Tool for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 25 Aug 2015 08:51 UTC"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Installer of Setting Restore Tool for DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Timestamp of code signing is before 25 Aug 2015 08:51 UTC"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Fuji Xerox Co.,Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Untrusted search path vulnerability in Installers of ART EX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 12 Apr 2017 02:04 UTC.), PostScript? Driver + Additional Feature Plug-in + PPD File for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 12 Apr 2017 02:10 UTC.), XPS Print Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 3 Nov 2017 23:48 UTC.), ART EX Direct FAX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 26 May 2017 07:44 UTC.), Setting Restore Tool for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 25 Aug 2015 08:51 UTC.) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Untrusted search path vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#09769017",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN09769017/index.html"
            },
            {
              "name": "http://www.fujixerox.co.jp/company/news/notice/2017/0831_rectification_work.html",
              "refsource": "CONFIRM",
              "url": "http://www.fujixerox.co.jp/company/news/notice/2017/0831_rectification_work.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10850",
    "datePublished": "2017-09-01T14:00:00",
    "dateReserved": "2017-07-04T00:00:00",
    "dateUpdated": "2024-08-05T17:50:12.585Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}