Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:colorqube_9201_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "0003D30B-5974-415E-B270-0D20F6ECD52F", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:colorqube_9201:-:*:*:*:*:*:*:*", "matchCriteriaId": "F29346DE-B346-4215-8671-3B7F5C3BC9A2", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:colorqube_9202_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "1BDD72A1-37CC-4C9F-B630-04539B4471CA", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:colorqube_9202:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D7A2B40-186E-49B6-8768-4B4338DBB0D5", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:colorqube_9203_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "5B85D326-0BE9-4945-847E-48CEAFE97CA2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:colorqube_9203:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E882D75-D354-42A6-A371-550B0EDBA646", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_6400_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "9A57603F-58BF-4930-BE4C-7CAB9CBB3AB3", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "67C12467-0FCE-4DB2-94A5-CD86D25F987D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_7525_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "305F1A70-ECF4-4196-A1DB-D5C0183DDF23", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_7525:-:*:*:*:*:*:*:*", "matchCriteriaId": "233C0B8A-705F-4919-B9EF-84576DCD8441", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_7530_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "16F7EA37-F93B-4F0A-AB29-CD2D6CE259A8", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_7530:-:*:*:*:*:*:*:*", "matchCriteriaId": "3647C556-3373-4EFF-9837-E9BB6B41534D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_7535_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "6350231F-20A4-413E-AD7B-7058BB9F39D9", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_7535:-:*:*:*:*:*:*:*", "matchCriteriaId": "432E5FC2-A461-4634-862D-89EF7412CEBD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_7545_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "D3CE8F08-2F98-4A8F-80DB-99948E97472D", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_7545:-:*:*:*:*:*:*:*", "matchCriteriaId": "6703B99E-84AD-46BE-ADDA-8153089B63DC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_7556_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "0C6A312A-BF0D-4869-A664-5C257848B22D", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_7556:-:*:*:*:*:*:*:*", "matchCriteriaId": "0216B0EA-A9D7-4421-921E-E9A9E22012EF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_7755_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "43DEBB21-760D-4178-A242-9F3D14436820", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_7755:-:*:*:*:*:*:*:*", "matchCriteriaId": "7612DD44-7BC8-43FA-ABBE-924C37E00F5E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_7765_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "D856A323-2F16-423F-89BE-16E57CB20369", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_7765:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDD8E8C7-4DF2-47ED-B985-45E90802B98E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:xerox:workcentre_7775_firmware:2013:*:*:*:*:*:*:*", "matchCriteriaId": "92C19385-586D-4138-BBE5-2F69B09404CE", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:xerox:workcentre_7775:-:*:*:*:*:*:*:*", "matchCriteriaId": "9777E051-B3EE-4732-A3EE-B82FCFB77DCC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Xerox ColorCube and WorkCenter devices in 2013 had hardcoded FTP and shell user accounts."}, {"lang": "es", "value": "Los dispositivos Xerox ColorQube y WorkCenter en 2013, pose\u00eda cuentas de usuario shell y FTP embebidas."}], "id": "CVE-2013-6362", "lastModified": "2024-11-21T01:59:04.423", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-02-13T23:15:11.260", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "http://firmware.re/usenixsec14/"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Vendor Advisory"], "url": "http://firmware.re/vulns/acsa-2013-005.php"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "http://firmware.re/usenixsec14/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"], "url": "http://firmware.re/vulns/acsa-2013-005.php"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-798"}], "source": "nvd@nist.gov", "type": "Primary"}]}