RICOH Interactive Whiteboard D2200 V1.1 to V2.2, D5500 V1.1 to V2.2, D5510 V1.1 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.1 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) uses hard-coded credentials, which may allow an attacker on the same network segments to login to the administrators settings screen and change the configuration.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN55263945/index.html | Third Party Advisory |
https://www.ricoh.com/info/2018/1127_1.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jpcert
Published: 2019-01-09T22:00:00
Updated: 2019-01-09T21:57:01
Reserved: 2018-08-30T00:00:00
Link: CVE-2018-16186
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-01-09T23:29:04.137
Modified: 2019-02-04T16:45:17.863
Link: CVE-2018-16186
JSON object: View
Redhat Information
No data.
CWE