Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-9330

EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-9330

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Certain Xerox WorkCentre printers before 073.xxx.000.02300 do not require the user to reenter or validate LDAP bind credentials when changing the LDAP connector IP address. A malicious actor who gains access to affected devices (e.g., by using default credentials) can change the LDAP connection IP address to a system owned by the actor without knowledge of the LDAP bind credentials. After changing the LDAP connection IP address, subsequent authentication attempts will result in the printer sending plaintext LDAP (Active Directory) credentials to the actor. Although the credentials may belong to a non-privileged user, organizations frequently use privileged service accounts to bind to Active Directory. The attacker gains a foothold on the Active Directory domain at a minimum, and may use the credentials to take over control of the Active Directory domain. This affects 3655*, 3655i*, 58XX*, 58XXi*, 59XX*, 59XXi*, 6655**, 6655i**, 72XX*, 72XXi*, 78XX**, 78XXi**, 7970**, 7970i**, EC7836**, and EC7856** devices.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Xerox产品安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Xerox 3655i等都是美国施乐(Xerox)公司的一款多功能打印机。 多款Xerox产品中存在安全漏洞。攻击者可利用该漏洞修改LDAP连接IP地址,获取明文形式的LDAP凭证。以下产品及版本受到影响:Xerox 3655* 073.xxx.000.02300之前版本;3655i* 073.xxx.000.02300之前版本;58XX* 073.xxx.000.02300之前版本;58XXi* 073.xxx.000.02300之前版本;59XX* 073.xxx.000.02300之前版本;59XX
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-9330

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-9330

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-02-21 · 15 CVEs total

CVE-2020-9329Gogs 竞争条件问题漏洞
CVE-2020-9327SQLite 代码问题漏洞
CVE-2019-18846Open-Xchange OX App Suite 代码问题漏洞
CVE-2020-7907JetBrains Scala plugin 信息泄露漏洞
CVE-2013-3587HTTPS 信息泄露漏洞
CVE-2012-6277Micro Focus Autonomy KeyView IDOL 安全漏洞
CVE-2020-6842D-Link DCH-M225 操作系统命令注入漏洞
CVE-2013-4088Open Ticket Request System 信息泄露漏洞
CVE-2013-3551OTRS和OTRS ITSM 信息泄露漏洞
CVE-2020-6841D-Link DCH-M225 操作系统命令注入漏洞
CVE-2019-19865Atos Unify OpenScape UC Web Client 跨站脚本漏洞
CVE-2019-19866Atos Unify OpenScape UC Web Client 信息泄露漏洞
CVE-2019-19452Patriot Viper RGB 缓冲区错误漏洞
CVE-2016-4606Apple Mac OS X Curl 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-9330

No comments yet


Leave a comment