CVE-2018-16184 (GCVE-0-2018-16184)
Vulnerability from cvelistv5 – Published: 2019-01-09 22:00 – Updated: 2024-08-05 10:17
VLAI?
Summary
RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- OS Command Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| RICOH COMPANY, LTD. | RICOH Interactive Whiteboard |
Affected:
D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T10:17:38.273Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#55263945",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN55263945/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.ricoh.com/info/2018/1127_1.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "RICOH Interactive Whiteboard",
"vendor": "RICOH COMPANY, LTD.",
"versions": [
{
"status": "affected",
"version": "D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400)"
}
]
}
],
"datePublic": "2019-01-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "OS Command Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-01-09T21:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#55263945",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "https://jvn.jp/en/jp/JVN55263945/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.ricoh.com/info/2018/1127_1.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2018-16184",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RICOH Interactive Whiteboard",
"version": {
"version_data": [
{
"version_value": "D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400)"
}
]
}
}
]
},
"vendor_name": "RICOH COMPANY, LTD."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#55263945",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN55263945/index.html"
},
{
"name": "https://www.ricoh.com/info/2018/1127_1.html",
"refsource": "MISC",
"url": "https://www.ricoh.com/info/2018/1127_1.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2018-16184",
"datePublished": "2019-01-09T22:00:00",
"dateReserved": "2018-08-30T00:00:00",
"dateUpdated": "2024-08-05T10:17:38.273Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ricoh:d2200_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6\", \"versionEndIncluding\": \"2.2\", \"matchCriteriaId\": \"0F3F42A4-1425-4B49-B1AD-83DA86744B56\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ricoh:d2200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43293871-70F7-4B1D-956F-9308A860FC85\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ricoh:d5500_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6\", \"versionEndIncluding\": \"2.2\", \"matchCriteriaId\": \"4DF0ABCA-D8A1-4B36-B812-39801E4C69C5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ricoh:d5500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2E56838-5CF4-4997-BCAD-684F8EA3E107\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ricoh:d5510_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6\", \"versionEndIncluding\": \"2.2\", \"matchCriteriaId\": \"05C3E2C4-BDAF-4AF9-968B-657724690FC8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ricoh:d5510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B09B5005-77BE-4F68-A7CE-F1D59DAD065C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ricoh:d5520_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6\", \"versionEndIncluding\": \"2.2\", \"matchCriteriaId\": \"70A94AA2-948E-4B74-9DF6-A0DFF0A128A4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ricoh:d5520:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4CA9708-C251-4278-983F-B3FA1787B11D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ricoh:d6500_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6\", \"versionEndIncluding\": \"2.2\", \"matchCriteriaId\": \"7465870D-78A5-47C0-8D31-8ACE35E79168\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ricoh:d6500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5848E96E-331B-4157-93B0-9DCB6B4B5A6F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ricoh:d6510_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6\", \"versionEndIncluding\": \"2.2\", \"matchCriteriaId\": \"79C23809-6F15-4AE6-AAF2-E6F5A398B176\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ricoh:d6510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DDE0143-ADE4-41E1-8884-2010B7E3EC95\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ricoh:d7500_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6\", \"versionEndIncluding\": \"2.2\", \"matchCriteriaId\": \"7735F80E-9131-42AC-B86F-0EE9E4A33E96\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ricoh:d7500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FD5552E-8242-4E70-8BDD-58D16FF53ABE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ricoh:d8400_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.6\", \"versionEndIncluding\": \"2.2\", \"matchCriteriaId\": \"AA9F9CB7-4ACD-4B73-BCEF-1DA7E86EE651\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ricoh:d8400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AB2BD85-80E2-4225-8100-446B9F2BA053\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors.\"}, {\"lang\": \"es\", \"value\": \"RICOH Interactive Whiteboard D2200, desde la V1.6 hasta la V2.2; D5500, desde la V1.6 hasta la V2.2; D5510, desde la V1.6 hasta la V2.2; y las versiones con pantalla de RICOH Interactive Whiteboard Controller Type1, desde la V1.6 hasta la V2.2 (D5520, D6500, D6510, D7500, D8400), permiten que atacantes remotos ejecuten comandos arbitrarios mediante vectores sin especificar.\"}]",
"id": "CVE-2018-16184",
"lastModified": "2024-11-21T03:52:14.720",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-01-09T23:29:04.043",
"references": "[{\"url\": \"https://jvn.jp/en/jp/JVN55263945/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.ricoh.com/info/2018/1127_1.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN55263945/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.ricoh.com/info/2018/1127_1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-16184\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2019-01-09T23:29:04.043\",\"lastModified\":\"2024-11-21T03:52:14.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"RICOH Interactive Whiteboard D2200, desde la V1.6 hasta la V2.2; D5500, desde la V1.6 hasta la V2.2; D5510, desde la V1.6 hasta la V2.2; y las versiones con pantalla de RICOH Interactive Whiteboard Controller Type1, desde la V1.6 hasta la V2.2 (D5520, D6500, D6510, D7500, D8400), permiten que atacantes remotos ejecuten comandos arbitrarios mediante vectores sin especificar.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ricoh:d2200_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6\",\"versionEndIncluding\":\"2.2\",\"matchCriteriaId\":\"0F3F42A4-1425-4B49-B1AD-83DA86744B56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ricoh:d2200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43293871-70F7-4B1D-956F-9308A860FC85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ricoh:d5500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6\",\"versionEndIncluding\":\"2.2\",\"matchCriteriaId\":\"4DF0ABCA-D8A1-4B36-B812-39801E4C69C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ricoh:d5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E56838-5CF4-4997-BCAD-684F8EA3E107\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ricoh:d5510_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6\",\"versionEndIncluding\":\"2.2\",\"matchCriteriaId\":\"05C3E2C4-BDAF-4AF9-968B-657724690FC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ricoh:d5510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09B5005-77BE-4F68-A7CE-F1D59DAD065C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ricoh:d5520_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6\",\"versionEndIncluding\":\"2.2\",\"matchCriteriaId\":\"70A94AA2-948E-4B74-9DF6-A0DFF0A128A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ricoh:d5520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4CA9708-C251-4278-983F-B3FA1787B11D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ricoh:d6500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6\",\"versionEndIncluding\":\"2.2\",\"matchCriteriaId\":\"7465870D-78A5-47C0-8D31-8ACE35E79168\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ricoh:d6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5848E96E-331B-4157-93B0-9DCB6B4B5A6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ricoh:d6510_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6\",\"versionEndIncluding\":\"2.2\",\"matchCriteriaId\":\"79C23809-6F15-4AE6-AAF2-E6F5A398B176\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ricoh:d6510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DDE0143-ADE4-41E1-8884-2010B7E3EC95\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ricoh:d7500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6\",\"versionEndIncluding\":\"2.2\",\"matchCriteriaId\":\"7735F80E-9131-42AC-B86F-0EE9E4A33E96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ricoh:d7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD5552E-8242-4E70-8BDD-58D16FF53ABE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ricoh:d8400_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.6\",\"versionEndIncluding\":\"2.2\",\"matchCriteriaId\":\"AA9F9CB7-4ACD-4B73-BCEF-1DA7E86EE651\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ricoh:d8400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB2BD85-80E2-4225-8100-446B9F2BA053\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/jp/JVN55263945/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.ricoh.com/info/2018/1127_1.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN55263945/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.ricoh.com/info/2018/1127_1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…