Overview
- Description
- Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-798
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ricoh:myprint:2.2.7:*:*:*:*:android:*:*", "vulnerable": true, "matchCriteriaId": "A17D9A19-40FF-4BB1-9C26-F14BC9DC8F68" }, { "criteria": "cpe:2.3:a:ricoh:myprint:2.9.2.4:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "CB2A4EBB-E592-4547-B16B-841D9D8DA63D" } ], "operator": "OR" } ] } ]