[Japanese]

JVNDB-2018-000124

Multiple vulnerabilities in RICOH Interactive Whiteboard

Overview

RICOH Interactive Whiteboard provided by RICOH COMPANY, LTD. contains multiple vulnerabilities listed below.
* Command injection (CWE-94) - CVE-2018-16184
* Missing file signature - CVE-2018-16185
* Hard-coded credentials for the administrator settings screen - CVE-2018-16186
* The server certificate is self-signed - CVE-2018-16187
* SQL injection (CWE-89) - CVE-2018-16188

RICOH COMPANY, LTD. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and RICOH COMPANY, LTD. coordinated under the Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 9.8 (Critical) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics 10.0 (High) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: None
  • Confidentiality Impact: Complete
  • Integrity Impact: Complete
  • Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2018-16184


CVSS V3 Severity:
Base Metrics: 5.0 (Medium) [JPCERT/CC Score]
  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: Low
CVSS V2 Severity:
Base Metrics: 5.1 (Medium) [JPCERT/CC Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2018-16185


CVSS V3 Severity:
Base Metrics: 8.4 (High) [JPCERT/CC Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics: 7.2 (High) [JPCERT/CC Score]
  • Access Vector: Local
  • Access Complexity: Low
  • Authentication: None
  • Confidentiality Impact: Complete
  • Integrity Impact: Complete
  • Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2018-16186


CVSS V3 Severity:
Base Metrics: 4.8 (Medium) [JPCERT/CC Score]
  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics: 4.0 (Medium) [JPCERT/CC Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: None
The above CVSS base scores have been assigned for CVE-2018-16187


CVSS V3 Severity:
Base Metrics: 9.8 (Critical) [JPCERT/CC Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics: 10.0 (High) [JPCERT/CC Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: None
  • Confidentiality Impact: Complete
  • Integrity Impact: Complete
  • Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2018-16188
Affected Products


Ricoh Co., Ltd
  • RICOH Interactive Whiteboard D2200
  • RICOH Interactive Whiteboard D5500
  • RICOH Interactive Whiteboard D5510
  • RICOH Interactive Whiteboard D5520
  • RICOH Interactive Whiteboard D6500
  • RICOH Interactive Whiteboard D6510
  • RICOH Interactive Whiteboard D7500
  • RICOH Interactive Whiteboard D8400

CVE-2018-16184
* RICOH Interactive Whiteboard D2200 V1.6 to V2.2
* RICOH Interactive Whiteboard D5500 V1.6 to V2.2
* RICOH Interactive Whiteboard D5510 V1.6 to V2.2
The following displays with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6500
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400

CVE-2018-16185, CVE-2018-16186
* RICOH Interactive Whiteboard D2200 V1.1 to V2.2
* RICOH Interactive Whiteboard D5500 V1.1 to V2.2
* RICOH Interactive Whiteboard D5510 V1.1 to V2.2
The following displays with RICOH Interactive Whiteboard Controller Type1 V1.1 to V2.2 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6500
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400
The following displays with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400

CVE-2018-16187, CVE-2018-16188
* RICOH Interactive Whiteboard D2200 V1.3 to V2.2
* RICOH Interactive Whiteboard D5500 V1.3 to V2.2
* RICOH Interactive Whiteboard D5510 V1.3 to V2.2
The following displays with RICOH Interactive Whiteboard Controller Type1 V1.3 to V2.2 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6500
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400
The following displays with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400
Impact

* A remote attacker may execute an arbitrary command with the administrative privilege - CVE-2018-16184
* A remote attacker may execute an altered program - CVE-2018-16185
* An attacker may log in to the administrator settings screen and change the configuration - CVE-2018-16186
* A man-in-the-middle attack allows an attacker to eavesdrop on an encrypted communication - CVE-2018-16187
* A remote attacker may obtain or alter the information in the database - CVE-2018-16188
Solution

[Update the Software]
Update to the latest version according to the information provided by the developer.
Vendor Information

Ricoh Co., Ltd
CWE (What is CWE?)

  1. SQL Injection(CWE-89) [IPA Evaluation]
  2. Code Injection(CWE-94) [IPA Evaluation]
  3. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2018-16184
  2. CVE-2018-16185
  3. CVE-2018-16186
  4. CVE-2018-16187
  5. CVE-2018-16188
References

  1. JVN : JVN#55263945
  2. National Vulnerability Database (NVD) : CVE-2018-16184
  3. National Vulnerability Database (NVD) : CVE-2018-16185
  4. National Vulnerability Database (NVD) : CVE-2018-16186
  5. National Vulnerability Database (NVD) : CVE-2018-16187
  6. National Vulnerability Database (NVD) : CVE-2018-16188
Revision History

  • [2018/11/27]
      Web page was published
  • [2018/11/29]
      Information under the section "Overview" was added
  • [2018/12/07]
      Information under the section "Products Affected" was updated
  • [2019/08/27]
      References : Contents were added