[Japanese]
|
JVNDB-2018-000124
|
Multiple vulnerabilities in RICOH Interactive Whiteboard
|
RICOH Interactive Whiteboard provided by RICOH COMPANY, LTD. contains multiple vulnerabilities listed below.
* Command injection (CWE-94) - CVE-2018-16184
* Missing file signature - CVE-2018-16185
* Hard-coded credentials for the administrator settings screen - CVE-2018-16186
* The server certificate is self-signed - CVE-2018-16187
* SQL injection (CWE-89) - CVE-2018-16188
RICOH COMPANY, LTD. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and RICOH COMPANY, LTD. coordinated under the Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 9.8 (Critical) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
CVSS V2 Severity: Base Metrics 10.0 (High) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Complete
- Integrity Impact: Complete
- Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2018-16184
|
CVSS V3 Severity:
Base Metrics:
5.0 (Medium) [JPCERT/CC Score]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: None
-
User Interaction: Required
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: Low
-
Availability Impact: Low
CVSS V2 Severity:Base Metrics:
5.1 (Medium)
[JPCERT/CC Score]
-
Access Vector: Network
-
Access Complexity: High
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: Partial
-
Availability Impact: Partial
The above CVSS base scores have been assigned for CVE-2018-16185
|
CVSS V3 Severity:
Base Metrics:
8.4 (High) [JPCERT/CC Score]
-
Attack Vector: Local
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
CVSS V2 Severity:Base Metrics:
7.2 (High)
[JPCERT/CC Score]
-
Access Vector: Local
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Complete
-
Integrity Impact: Complete
-
Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2018-16186
|
CVSS V3 Severity:
Base Metrics:
4.8 (Medium) [JPCERT/CC Score]
-
Attack Vector: Network
-
Attack Complexity: High
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: Low
-
Integrity Impact: Low
-
Availability Impact: None
CVSS V2 Severity:Base Metrics:
4.0 (Medium)
[JPCERT/CC Score]
-
Access Vector: Network
-
Access Complexity: High
-
Authentication: None
-
Confidentiality Impact: Partial
-
Integrity Impact: Partial
-
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2018-16187
|
CVSS V3 Severity:
Base Metrics:
9.8 (Critical) [JPCERT/CC Score]
-
Attack Vector: Network
-
Attack Complexity: Low
-
Privileges Required: None
-
User Interaction: None
-
Scope: Unchanged
-
Confidentiality Impact: High
-
Integrity Impact: High
-
Availability Impact: High
CVSS V2 Severity:Base Metrics:
10.0 (High)
[JPCERT/CC Score]
-
Access Vector: Network
-
Access Complexity: Low
-
Authentication: None
-
Confidentiality Impact: Complete
-
Integrity Impact: Complete
-
Availability Impact: Complete
The above CVSS base scores have been assigned for CVE-2018-16188
|
|
Ricoh Co., Ltd
- RICOH Interactive Whiteboard D2200
- RICOH Interactive Whiteboard D5500
- RICOH Interactive Whiteboard D5510
- RICOH Interactive Whiteboard D5520
- RICOH Interactive Whiteboard D6500
- RICOH Interactive Whiteboard D6510
- RICOH Interactive Whiteboard D7500
- RICOH Interactive Whiteboard D8400
|
CVE-2018-16184
* RICOH Interactive Whiteboard D2200 V1.6 to V2.2
* RICOH Interactive Whiteboard D5500 V1.6 to V2.2
* RICOH Interactive Whiteboard D5510 V1.6 to V2.2
The following displays with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6500
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400
CVE-2018-16185, CVE-2018-16186
* RICOH Interactive Whiteboard D2200 V1.1 to V2.2
* RICOH Interactive Whiteboard D5500 V1.1 to V2.2
* RICOH Interactive Whiteboard D5510 V1.1 to V2.2
The following displays with RICOH Interactive Whiteboard Controller Type1 V1.1 to V2.2 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6500
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400
The following displays with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400
CVE-2018-16187, CVE-2018-16188
* RICOH Interactive Whiteboard D2200 V1.3 to V2.2
* RICOH Interactive Whiteboard D5500 V1.3 to V2.2
* RICOH Interactive Whiteboard D5510 V1.3 to V2.2
The following displays with RICOH Interactive Whiteboard Controller Type1 V1.3 to V2.2 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6500
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400
The following displays with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached
* RICOH Interactive Whiteboard D5520
* RICOH Interactive Whiteboard D6510
* RICOH Interactive Whiteboard D7500
* RICOH Interactive Whiteboard D8400
|
* A remote attacker may execute an arbitrary command with the administrative privilege - CVE-2018-16184
* A remote attacker may execute an altered program - CVE-2018-16185
* An attacker may log in to the administrator settings screen and change the configuration - CVE-2018-16186
* A man-in-the-middle attack allows an attacker to eavesdrop on an encrypted communication - CVE-2018-16187
* A remote attacker may obtain or alter the information in the database - CVE-2018-16188
|
[Update the Software]
Update to the latest version according to the information provided by the developer.
|
Ricoh Co., Ltd
|
- SQL Injection(CWE-89) [IPA Evaluation]
- Code Injection(CWE-94) [IPA Evaluation]
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2018-16184
- CVE-2018-16185
- CVE-2018-16186
- CVE-2018-16187
- CVE-2018-16188
|
- JVN : JVN#55263945
- National Vulnerability Database (NVD) : CVE-2018-16184
- National Vulnerability Database (NVD) : CVE-2018-16185
- National Vulnerability Database (NVD) : CVE-2018-16186
- National Vulnerability Database (NVD) : CVE-2018-16187
- National Vulnerability Database (NVD) : CVE-2018-16188
|
- [2018/11/27]
Web page was published
- [2018/11/29]
Information under the section "Overview" was added
- [2018/12/07]
Information under the section "Products Affected" was updated
- [2019/08/27]
References : Contents were added
|