cve-2024-41995
Vulnerability from cvelistv5
Published
2024-08-06 06:51
Modified
2024-08-06 13:23
Severity ?
EPSS score ?
Summary
Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ricoh Company, Ltd. | JavaTM Platform |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ricoh_company_ltd:javatm_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "javatm_platform", "vendor": "ricoh_company_ltd", "versions": [ { "lessThan": "12.89", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-41995", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T13:19:16.839794Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T13:23:36.633Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "JavaTM Platform", "vendor": "Ricoh Company, Ltd.", "versions": [ { "status": "affected", "version": "Ver.12.89 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor." } ], "problemTypes": [ { "descriptions": [ { "description": "Initialization of a Resource with an Insecure Default", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T06:51:51.329Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000010" }, { "url": "https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000010" }, { "url": "https://jvn.jp/en/jp/JVN78728294/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-41995", "datePublished": "2024-08-06T06:51:51.329Z", "dateReserved": "2024-07-26T00:44:59.022Z", "dateUpdated": "2024-08-06T13:23:36.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-41995\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-08-06T07:15:46.330\",\"lastModified\":\"2024-08-06T16:30:24.547\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor.\"},{\"lang\":\"es\",\"value\":\"La inicializaci\u00f3n de un recurso con una vulnerabilidad predeterminada insegura existe en JavaTM Platform versi\u00f3n 12.89 y versiones anteriores. Si se aprovecha esta vulnerabilidad, el producto puede verse afectado por algunas vulnerabilidades conocidas de TLS1.0 y TLS1.1. En cuanto a los productos/modelos/versiones espec\u00edficos de impresoras multifunci\u00f3n y que contienen la plataforma JavaTM, consulte la informaci\u00f3n proporcionada por el proveedor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"references\":[{\"url\":\"https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000010\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://jvn.jp/en/jp/JVN78728294/\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000010\",\"source\":\"vultures@jpcert.or.jp\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.