Xerox Phaser 6510 prior to 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 prior to 65.61.23 and 65.59.11 (Bridge), VersaLink B400 prior to 37.61.23 and 37.59.01 (Bridge), B405 prior to 38.61.23 and 38.59.01 (Bridge), B600/B610 prior to 32.61.23 and 32.59.01 (Bridge), B605/B615 prior to 33.61.23 and 33.59.01 (Bridge), B7025/30/35 prior to 58.61.23 and 58.59.11 (Bridge), C400 prior to 67.61.23 and 67.59.01 (Bridge), C405 prior to 68.61.23 and 68.59.01 (Bridge), C500/C600 prior to 61.61.23 and 61.59.01 (Bridge), C505/C605 prior to 62.61.23 and 62.59.11 (Bridge), C7000 prior to 56.61.23 and 56.59.01 (Bridge), C7020/25/30 prior to 57.61.23 and 57.59.01 (Bridge), C8000/C9000 prior to 70.61.23 and 70.59.01 (Bridge), allows remote attackers with "a weaponized clone file" to execute arbitrary commands in the Web User Interface.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
xerox phaser_6510_firmware |
||
xerox workcentre_6515_firmware |
||
xerox versalink_b400_firmware |
||
xerox versalink_b405_firmware |
||
xerox versalink_b600_firmware |
||
xerox versalink_b610_firmware |
||
xerox versalink_b605_firmware |
||
xerox versalink_b615_firmware |
||
xerox versalink_b7025_firmware |
||
xerox versalink_b7030_firmware |
||
xerox versalink_b7035_firmware |
||
xerox versalink_c400_firmware |
||
xerox versalink_c405_firmware |
||
xerox versalink_c500_firmware |
||
xerox versalink_c600_firmware |
||
xerox versalink_c505_firmware |
||
xerox versalink_c605_firmware |
||
xerox versalink_c7000_firmware |
||
xerox versalink_c7020_firmware |
||
xerox versalink_c7025_firmware |
||
xerox versalink_c7030_firmware |
||
xerox versalink_c8000_firmware |
||
xerox versalink_c9000_firmware |