Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/Nov/46 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-12-14 07:29
Updated : 2019-01-03 06:11
NVD link : CVE-2018-18006
Mitre link : CVE-2018-18006
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
ricoh
- myprint