Vulnerabilites related to lexmark - x78x
cve-2013-6032
Vulnerability from cvelistv5
Published
2014-02-04 02:00
Modified
2024-08-06 17:29
Severity ?
Summary
cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter.
References
http://www.kb.cert.org/vuls/id/108062third-party-advisory, x_refsource_CERT-VN
http://support.lexmark.com/index?page=content&id=TE586x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:29:42.998Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#108062",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/108062"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.lexmark.com/index?page=content\u0026id=TE586"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-04T02:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#108062",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/108062"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.lexmark.com/index?page=content\u0026id=TE586"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2013-6032",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#108062",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/108062"
            },
            {
              "name": "http://support.lexmark.com/index?page=content\u0026id=TE586",
              "refsource": "CONFIRM",
              "url": "http://support.lexmark.com/index?page=content\u0026id=TE586"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2013-6032",
    "datePublished": "2014-02-04T02:00:00",
    "dateReserved": "2013-10-04T00:00:00",
    "dateUpdated": "2024-08-06T17:29:42.998Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2014-02-04 05:39
Modified
2024-11-21 01:58
Severity ?
Summary
cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:lexmark:25xxn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7513DFC0-4510-4B83-970A-BA0E62638713",
              "versionEndIncluding": "lcl.cu.p114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:c52x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6509A55F-42A6-48C6-B48F-59C6E4C01281",
              "versionEndIncluding": "ls.fa.p150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:c53x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "858E4963-A4DF-4547-A690-86F21C5C6761",
              "versionEndIncluding": "ls.sw.p069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:c77x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E8F5F15-A5A5-4ABC-BB1B-B4F78F6F6576",
              "versionEndIncluding": "lc.cm.p052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:c78x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CC0B83D-98E2-4342-92B8-3F5DAFF36534",
              "versionEndIncluding": "lc.io.p187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:c920:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "589B4386-FB3A-4CE8-852B-2631BE5F5C3D",
              "versionEndIncluding": "ls.ta.p152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:c935dn:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52F3ADA-60C7-4C6D-8BAE-0537D2FF64CE",
              "versionEndIncluding": "lc.jo.p091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:e250:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73229A56-3484-4EDC-B200-4D2177D01594",
              "versionEndIncluding": "le.pm.p126",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:e350:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDCDF17-F05F-4891-9DF8-6018D7CCC289",
              "versionEndIncluding": "le.ph.p129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:e450:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FA662D9-5130-44E3-8450-872D8FE2E1D0",
              "versionEndIncluding": "lm.sz.p124",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:n4000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F8465F-F3AB-4DBE-A50F-552D2810C7C4",
              "versionEndIncluding": "lc.md.p119",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:n4050e:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D00DCD4A-92D4-4FBE-8E22-3B825DC333AB",
              "versionEndIncluding": "go.go.n206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:n70xxe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DCDEF0E-5EC7-45C5-8BD4-048BE3122325",
              "versionEndIncluding": "lc.co.n309",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:t64x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "234FF186-2024-42DE-81A2-B7A96B08589D",
              "versionEndIncluding": "ls.st.p343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:w840:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51FF02A-7F7C-4D6C-9F98-1C44F3D962A7",
              "versionEndIncluding": "ls.ha.p252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:x642:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB918500-A15B-45CE-89DE-B4EC86423444",
              "versionEndIncluding": "lc2.mb.p318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:x644:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A5BAA6A-6BFE-4747-952E-7F7D8390CF40",
              "versionEndIncluding": "lc4.be.p487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:x646:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E2CE0BB-0BD7-4B64-995C-12A7012A2029",
              "versionEndIncluding": "lc2.mc.p373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:x64xef:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8C7D31-1A14-4C30-9471-CCF825101A45",
              "versionEndIncluding": "lc2.ti.p325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:x772:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26FD959-9014-4036-B5B7-3DB996E488AD",
              "versionEndIncluding": "lc2.tr.p291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:x78x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "409D8B7E-60BF-4E0A-A640-A75B3D17CD7D",
              "versionEndIncluding": "lc2.io.p335",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:x85x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFEB32C1-C2A7-4BAB-81A2-8454481155CE",
              "versionEndIncluding": "lc4.be.p487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:lexmark:x94x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A624E9D4-CC32-4157-A215-105BA30A4EB2",
              "versionEndIncluding": "lc.br.p141",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter."
    },
    {
      "lang": "es",
      "value": "cgi-bin/postpf/cgi-bin/dynamic/config/config.html en impresoras Lexmark X94x anterior a LC.BR.P142, X85x hasta LC4.BE.P487, X644 y X646 anterior a LC2.MC.P374, X642 hasta LC2.MB.P318, W840 hasta LS.HA.P252, T64x anterior a LS.ST.P344, X64xef hasta LC2.TI.P325, C935dn hasta LC.JO.P091, C920 hasta LS.TA.P152, C78x hasta LC.IO.P187, X78x hasta LC2.IO.P335, C77x hasta LC.CM.P052, X772 hasta LC2.TR.P291, C53x hasta LS.SW.P069, C52x hasta LS.FA.P150, 25xxN hasta LCL.CU.P114, N4000 hasta LC.MD.P119, N4050e hasta GO.GO.N206, N70xxe hasta LC.CO.N309, E450 hasta LM.SZ.P124, E350 hasta LE.PH.P129 y E250 hasta LE.PM.P126 permite a atacantes remotos eliminar la contrase\u00f1a administrativa a trav\u00e9s del par\u00e1metro vac.255.GENPASSWORD."
    }
  ],
  "id": "CVE-2013-6032",
  "lastModified": "2024-11-21T01:58:39.373",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-04T05:39:08.137",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://support.lexmark.com/index?page=content\u0026id=TE586"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/108062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.lexmark.com/index?page=content\u0026id=TE586"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/108062"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-201402-0119
Vulnerability from variot

cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter. Certain Lexmark devices are vulnerable to unverified password changes and stored cross-site scripting attacks. Lexmark Laser Printers is a laser printer device. Lexmark Laser Printers manages the WEB interface for verification bypass vulnerabilities. An empty string. Attackers can exploit this issue to gain authenticated access to the affected device and access sensitive information, which may aid in further attacks

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201402-0119",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "25xxn",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lcl.cu.p114"
      },
      {
        "model": "c52x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "ls.fa.p150"
      },
      {
        "model": "c53x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "ls.sw.p069"
      },
      {
        "model": "c77x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc.cm.p052"
      },
      {
        "model": "c78x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc.io.p187"
      },
      {
        "model": "c920",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "ls.ta.p152"
      },
      {
        "model": "c935dn",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc.jo.p091"
      },
      {
        "model": "e250",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "le.pm.p126"
      },
      {
        "model": "e350",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "le.ph.p129"
      },
      {
        "model": "e450",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lm.sz.p124"
      },
      {
        "model": "n4000",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc.md.p119"
      },
      {
        "model": "n4050e",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "go.go.n206"
      },
      {
        "model": "n70xxe",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc.co.n309"
      },
      {
        "model": "t64x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "ls.st.p343"
      },
      {
        "model": "w840",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "ls.ha.p252"
      },
      {
        "model": "x642",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc2.mb.p318"
      },
      {
        "model": "x646",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc2.mc.p373"
      },
      {
        "model": "x64xef",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc2.ti.p325"
      },
      {
        "model": "x772",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc2.tr.p291"
      },
      {
        "model": "x78x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc2.io.p335"
      },
      {
        "model": "x85x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc4.be.p487"
      },
      {
        "model": "x94x",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "lexmark",
        "version": "lc.br.p141"
      },
      {
        "model": "x644",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "lexmark",
        "version": "lc4.be.p487"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "x644",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "lexmark",
        "version": "lc2.mc.p373"
      },
      {
        "model": "laser printer w840",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "laser printer c920",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "laser printer t64x",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "laser printer c53x",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "laser printer c935dn",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "laser printer c52x",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "laser printer e450",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "laser printer e350",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "laser printer e250",
        "scope": null,
        "trust": 0.6,
        "vendor": "lexmark",
        "version": null
      },
      {
        "model": "n4050e",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "go.go.n206"
      },
      {
        "model": "x772",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "lc2.tr.p291"
      },
      {
        "model": "e250",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "le.pm.p126"
      },
      {
        "model": "n70xxe",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "lc.co.n309"
      },
      {
        "model": "n4000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "lc.md.p119"
      },
      {
        "model": "e350",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "le.ph.p129"
      },
      {
        "model": "e450",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "lm.sz.p124"
      },
      {
        "model": "c77x",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "lc.cm.p052"
      },
      {
        "model": "c52x",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "ls.fa.p150"
      },
      {
        "model": "c53x",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "lexmark",
        "version": "ls.sw.p069"
      },
      {
        "model": "n4050e go.go.n206",
        "scope": null,
        "trust": 0.3,
        "vendor": "lexmark",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108062"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "db": "BID",
        "id": "65274"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6032"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:lexmark:25xxn",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:c52x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:c53x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:c77x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:c78x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:c920",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:c935dn",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:e250",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:e350",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:e450",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:n4000",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:n4050e",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:n70xxe",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:t64x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:w840",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:x642",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:x644",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:x646",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:x64xef",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:x772",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:x78x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:x85x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:lexmark:x94x",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jeff Popio",
    "sources": [
      {
        "db": "BID",
        "id": "65274"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-6032",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-6032",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2014-00770",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-6032",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-6032",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-00770",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201402-018",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6032"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter. Certain Lexmark devices are vulnerable to unverified password changes and stored cross-site scripting attacks. Lexmark Laser Printers is a laser printer device. Lexmark Laser Printers manages the WEB interface for verification bypass vulnerabilities. An empty string. \nAttackers can exploit this issue to gain authenticated access to the affected device and access sensitive information, which may aid in further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-6032"
      },
      {
        "db": "CERT/CC",
        "id": "VU#108062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "db": "BID",
        "id": "65274"
      }
    ],
    "trust": 3.15
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#108062",
        "trust": 3.8
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6032",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "65274",
        "trust": 0.9
      },
      {
        "db": "JVN",
        "id": "JVNVU92568059",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-018",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108062"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "db": "BID",
        "id": "65274"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6032"
      }
    ]
  },
  "id": "VAR-201402-0119",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      }
    ],
    "trust": 1.55625
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:13:50.037000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "TE586 (Password Reset Vulnerability)",
        "trust": 0.8,
        "url": "http://support.lexmark.com/index?page=content\u0026id=TE586\u0026locale=EN\u0026userlocale=EN_US"
      },
      {
        "title": "Lexmark Laser Printers verifies patches that bypass the vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/43414"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6032"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.kb.cert.org/vuls/id/108062"
      },
      {
        "trust": 1.6,
        "url": "http://support.lexmark.com/index?page=content\u0026id=te586"
      },
      {
        "trust": 0.8,
        "url": "about vulnerability notes"
      },
      {
        "trust": 0.8,
        "url": "contact us about this vulnerability"
      },
      {
        "trust": 0.8,
        "url": "provide a vendor statement"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6032"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu92568059/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6032"
      },
      {
        "trust": 0.3,
        "url": "http://www.lexmark.com/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108062"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "db": "BID",
        "id": "65274"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6032"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#108062"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "db": "BID",
        "id": "65274"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-6032"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#108062"
      },
      {
        "date": "2014-02-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "date": "2014-01-31T00:00:00",
        "db": "BID",
        "id": "65274"
      },
      {
        "date": "2014-02-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "date": "2014-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      },
      {
        "date": "2014-02-04T05:39:08.137000",
        "db": "NVD",
        "id": "CVE-2013-6032"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#108062"
      },
      {
        "date": "2014-02-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-00770"
      },
      {
        "date": "2014-01-31T00:00:00",
        "db": "BID",
        "id": "65274"
      },
      {
        "date": "2014-02-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005982"
      },
      {
        "date": "2014-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      },
      {
        "date": "2024-11-21T01:58:39.373000",
        "db": "NVD",
        "id": "CVE-2013-6032"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Lexmark laser printers contain multiple vulnerabilities",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108062"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201402-018"
      }
    ],
    "trust": 0.6
  }
}