ID

VAR-201901-0834


CVE

CVE-2018-16188


TITLE

Multiple vulnerabilities in RICOH Interactive Whiteboard

Trust: 0.8

sources: JVNDB: JVNDB-2018-000124

DESCRIPTION

SQL injection vulnerability in the RICOH Interactive Whiteboard D2200 V1.3 to V2.2, D5500 V1.3 to V2.2, D5510 V1.3 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.3 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) allows remote attackers to execute arbitrary SQL commands via unspecified vectors. RICOH Interactive Whiteboard provided by RICOH COMPANY, LTD. contains multiple vulnerabilities listed below. * Command injection (CWE-94) - CVE-2018-16184 * Missing file signature - CVE-2018-16185 * Hard-coded credentials for the administrator settings screen - CVE-2018-16186 * The server certificate is self-signed - CVE-2018-16187 * SQL injection (CWE-89) - CVE-2018-16188 RICOH COMPANY, LTD. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and RICOH COMPANY, LTD. coordinated under the Information Security Early Warning Partnership.* A remote attacker may execute an arbitrary command with the administrative privilege - CVE-2018-16184 * A remote attacker may execute an altered program - CVE-2018-16185 * An attacker may log in to the administrator settings screen and change the configuration - CVE-2018-16186 * A man-in-the-middle attack allows an attacker to eavesdrop on an encrypted communication - CVE-2018-16187 * A remote attacker may obtain or alter the information in the database - CVE-2018-16188 . RICOHInteractiveWhiteboardD2200 and so on are all Ricoh's multi-function printers. A SQL injection vulnerability exists in several RICOH InteractiveWhiteboard products that can be exploited by remote attackers to obtain or modify information in the database

Trust: 2.16

sources: NVD: CVE-2018-16188 // JVNDB: JVNDB-2018-000124 // CNVD: CNVD-2018-25435

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-25435

AFFECTED PRODUCTS

vendor:ricohmodel:d7500scope:gteversion:1.3

Trust: 1.0

vendor:ricohmodel:d5500scope:gteversion:1.3

Trust: 1.0

vendor:ricohmodel:d7500scope:lteversion:3.1.10137.0

Trust: 1.0

vendor:ricohmodel:d8400scope:gteversion:1.3

Trust: 1.0

vendor:ricohmodel:d2200scope:lteversion:2.2

Trust: 1.0

vendor:ricohmodel:d5510scope:gteversion:1.3

Trust: 1.0

vendor:ricohmodel:d6500scope:gteversion:1.3

Trust: 1.0

vendor:ricohmodel:d2200scope:gteversion:1.3

Trust: 1.0

vendor:ricohmodel:d5520scope:lteversion:2.2

Trust: 1.0

vendor:ricohmodel:d5510scope:lteversion:2.2

Trust: 1.0

vendor:ricohmodel:d6510scope:gteversion:3.0

Trust: 1.0

vendor:ricohmodel:d8400scope:lteversion:2.2

Trust: 1.0

vendor:ricohmodel:d6500scope:lteversion:2.2

Trust: 1.0

vendor:ricohmodel:d5520scope:gteversion:3.0

Trust: 1.0

vendor:ricohmodel:d5500scope:lteversion:2.2

Trust: 1.0

vendor:ricohmodel:d7500scope:gteversion:3.0

Trust: 1.0

vendor:ricohmodel:d8400scope:lteversion:3.1.10137.0

Trust: 1.0

vendor:ricohmodel:d6510scope:lteversion:2.2

Trust: 1.0

vendor:ricohmodel:d5520scope:lteversion:3.1.10137.0

Trust: 1.0

vendor:ricohmodel:d7500scope:lteversion:2.2

Trust: 1.0

vendor:ricohmodel:d8400scope:gteversion:3.0

Trust: 1.0

vendor:ricohmodel:d5520scope:gteversion:1.3

Trust: 1.0

vendor:ricohmodel:d6510scope:gteversion:1.3

Trust: 1.0

vendor:ricohmodel:d6510scope:lteversion:3.1.10137.0

Trust: 1.0

vendor:ricohmodel:interactive whiteboard d2200scope: - version: -

Trust: 0.8

vendor:ricohmodel:interactive whiteboard d5500scope: - version: -

Trust: 0.8

vendor:ricohmodel:interactive whiteboard d5510scope: - version: -

Trust: 0.8

vendor:ricohmodel:interactive whiteboard d5520scope: - version: -

Trust: 0.8

vendor:ricohmodel:interactive whiteboard d6500scope: - version: -

Trust: 0.8

vendor:ricohmodel:interactive whiteboard d6510scope: - version: -

Trust: 0.8

vendor:ricohmodel:interactive whiteboard d7500scope: - version: -

Trust: 0.8

vendor:ricohmodel:interactive whiteboard d8400scope: - version: -

Trust: 0.8

vendor:ricohmodel:interactive whiteboard d2200scope:gteversion:1.3<=2.2

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d5500scope:gteversion:1.3<=2.2

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d5510scope:gteversion:1.3<=2.2

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d6500 (ricoh interactive whiteboard controller type1 toscope:eqversion:1.32.2)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d6510 (ricoh interactive whiteboard controller type1 toscope:eqversion:1.32.2)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d7500 (ricoh interactive whiteboard controller type1 toscope:eqversion:1.32.2)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d8400 (ricoh interactive whiteboard controller type1 toscope:eqversion:1.32.2)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d5520 (ricoh interactive whiteboard controller type1 toscope:eqversion:1.32.2)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d5520 (ricoh interactive whiteboard controller type toscope:eqversion:23.03.1)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d6500 (ricoh interactive whiteboard controller type toscope:eqversion:23.03.1)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d6510 (ricoh interactive whiteboard controller type toscope:eqversion:23.03.1)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d7500 (ricoh interactive whiteboard controller type toscope:eqversion:23.03.1)

Trust: 0.6

vendor:ricohmodel:interactive whiteboard d8400 (ricoh interactive whiteboard controller type toscope:eqversion:23.03.1)

Trust: 0.6

sources: CNVD: CNVD-2018-25435 // JVNDB: JVNDB-2018-000124 // NVD: CVE-2018-16188

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2018-000124
value: CRITICAL

Trust: 1.6

IPA: JVNDB-2018-000124
value: MEDIUM

Trust: 1.6

nvd@nist.gov: CVE-2018-16188
value: CRITICAL

Trust: 1.0

IPA: JVNDB-2018-000124
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-25435
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201811-739
value: HIGH

Trust: 0.6

IPA: JVNDB-2018-000124
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.6

nvd@nist.gov: CVE-2018-16188
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2018-000124
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2018-000124
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2018-000124
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2018-25435
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IPA: JVNDB-2018-000124
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 1.6

nvd@nist.gov: CVE-2018-16188
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

IPA: JVNDB-2018-000124
baseSeverity: MEDIUM
baseScore: 5.0
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2018-000124
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA: JVNDB-2018-000124
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-25435 // JVNDB: JVNDB-2018-000124 // JVNDB: JVNDB-2018-000124 // JVNDB: JVNDB-2018-000124 // JVNDB: JVNDB-2018-000124 // JVNDB: JVNDB-2018-000124 // CNNVD: CNNVD-201811-739 // NVD: CVE-2018-16188

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.8

problemtype:CWE-Other

Trust: 0.8

problemtype:CWE-94

Trust: 0.8

sources: JVNDB: JVNDB-2018-000124 // NVD: CVE-2018-16188

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201811-739

TYPE

SQL injection

Trust: 0.6

sources: CNNVD: CNNVD-201811-739

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-000124

PATCH

title:RICOH COMPANY, LTD. websiteurl:https://www.ricoh.com/info/2018/1127_1.html

Trust: 0.8

title:Patches for multiple RICOHInteractiveWhiteboard product SQL injection vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/147327

Trust: 0.6

title:Multiple RICOH Interactive Whiteboard product SQL Repair measures for injecting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87004

Trust: 0.6

sources: CNVD: CNVD-2018-25435 // JVNDB: JVNDB-2018-000124 // CNNVD: CNNVD-201811-739

EXTERNAL IDS

db:NVDid:CVE-2018-16188

Trust: 3.0

db:JVNid:JVN55263945

Trust: 2.4

db:JVNDBid:JVNDB-2018-000124

Trust: 1.4

db:CNVDid:CNVD-2018-25435

Trust: 0.6

db:CNNVDid:CNNVD-201811-739

Trust: 0.6

sources: CNVD: CNVD-2018-25435 // JVNDB: JVNDB-2018-000124 // CNNVD: CNNVD-201811-739 // NVD: CVE-2018-16188

REFERENCES

url:https://jvn.jp/en/jp/jvn55263945/index.html

Trust: 2.4

url:https://www.ricoh.com/info/2018/1127_1.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16188

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16184

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16185

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16186

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16187

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16184

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16185

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16186

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16187

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-16188

Trust: 0.8

url:https://jvndb.jvn.jp/en/contents/2018/jvndb-2018-000124.html

Trust: 0.6

sources: CNVD: CNVD-2018-25435 // JVNDB: JVNDB-2018-000124 // CNNVD: CNNVD-201811-739 // NVD: CVE-2018-16188

SOURCES

db:CNVDid:CNVD-2018-25435
db:JVNDBid:JVNDB-2018-000124
db:CNNVDid:CNNVD-201811-739
db:NVDid:CVE-2018-16188

LAST UPDATE DATE

2024-11-23T22:00:09.042000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-25435date:2018-12-14T00:00:00
db:JVNDBid:JVNDB-2018-000124date:2019-08-27T00:00:00
db:CNNVDid:CNNVD-201811-739date:2019-02-15T00:00:00
db:NVDid:CVE-2018-16188date:2024-11-21T03:52:15.240

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-25435date:2018-12-14T00:00:00
db:JVNDBid:JVNDB-2018-000124date:2018-11-27T00:00:00
db:CNNVDid:CNNVD-201811-739date:2018-11-28T00:00:00
db:NVDid:CVE-2018-16188date:2019-01-09T23:29:04.247