PrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution.
References
Link | Resource |
---|---|
https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite | Press/Media Coverage Third Party Advisory |
https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints | Press/Media Coverage Third Party Advisory |
https://www.printerlogic.com/security-bulletin/ | Vendor Advisory |
https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html | Third Party Advisory |
https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/ | Exploit Press/Media Coverage Third Party Advisory |
https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite | Press/Media Coverage Third Party Advisory |
http://printerlogic.com | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-02-01 15:15
Updated : 2022-02-02 11:14
NVD link : CVE-2021-42638
Mitre link : CVE-2021-42638
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
printerlogic
- web_stack
linux
- linux_kernel
apple
- macos