FKIE_CVE-2024-41995
Vulnerability from fkie_nvd - Published: 2024-08-06 07:15 - Updated: 2025-03-24 18:15
Severity ?
Summary
Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor."
},
{
"lang": "es",
"value": "La inicializaci\u00f3n de un recurso con una vulnerabilidad predeterminada insegura existe en JavaTM Platform versi\u00f3n 12.89 y versiones anteriores. Si se aprovecha esta vulnerabilidad, el producto puede verse afectado por algunas vulnerabilidades conocidas de TLS1.0 y TLS1.1. En cuanto a los productos/modelos/versiones espec\u00edficos de impresoras multifunci\u00f3n y que contienen la plataforma JavaTM, consulte la informaci\u00f3n proporcionada por el proveedor."
}
],
"id": "CVE-2024-41995",
"lastModified": "2025-03-24T18:15:19.413",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-08-06T07:15:46.330",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000010"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://jvn.jp/en/jp/JVN78728294/"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000010"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…