漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Certain Xerox WorkCentre printers before 073.xxx.000.02300 do not require the user to reenter or validate LDAP bind credentials when changing the LDAP connector IP address. A malicious actor who gains access to affected devices (e.g., by using default credentials) can change the LDAP connection IP address to a system owned by the actor without knowledge of the LDAP bind credentials. After changing the LDAP connection IP address, subsequent authentication attempts will result in the printer sending plaintext LDAP (Active Directory) credentials to the actor. Although the credentials may belong to a non-privileged user, organizations frequently use privileged service accounts to bind to Active Directory. The attacker gains a foothold on the Active Directory domain at a minimum, and may use the credentials to take over control of the Active Directory domain. This affects 3655*, 3655i*, 58XX*, 58XXi*, 59XX*, 59XXi*, 6655**, 6655i**, 72XX*, 72XXi*, 78XX**, 78XXi**, 7970**, 7970i**, EC7836**, and EC7856** devices.
漏洞信息
N/A
漏洞
N/A
漏洞
多款Xerox产品安全漏洞
漏洞信息
Xerox 3655i等都是美国施乐(Xerox)公司的一款多功能打印机。 多款Xerox产品中存在安全漏洞。攻击者可利用该漏洞修改LDAP连接IP地址,获取明文形式的LDAP凭证。以下产品及版本受到影响:Xerox 3655* 073.xxx.000.02300之前版本;3655i* 073.xxx.000.02300之前版本;58XX* 073.xxx.000.02300之前版本;58XXi* 073.xxx.000.02300之前版本;59XX* 073.xxx.000.02300之前版本;59XX
漏洞信息
N/A
漏洞
N/A