Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_RICOH_CVE-2019-14299.NASL
HistoryFeb 13, 2024 - 12:00 a.m.

RICOH SP C250 Series Authentication Method Vulnerable to Brute Force Attacks (CVE-2019-14299)

2024-02-1300:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
5
ricoh
sp c250dn
authentication
vulnerability
brute force
attack
cve-2019-14299
tenable.ot
mfp
firmware

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.7%

Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(501968);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/14");

  script_cve_id("CVE-2019-14299");

  script_name(english:"RICOH SP C250 Series Authentication Method Vulnerable to Brute Force Attacks (CVE-2019-14299)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable
to Brute Force Attacks. Some Ricoh printers did not implement account
lockout. Therefore, it was possible to obtain the local account
credentials by brute force.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  # https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-ricoh-printers/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e793f04b");
  script_set_attribute(attribute:"see_also", value:"https://www.ricoh-usa.com/en/support-and-download");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-14299");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(307);

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/03/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/02/13");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ricoh:sp_c250dn_firmware:1.05");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ricoh:sp_c250sf_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ricoh:sp_c252dn_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ricoh:sp_c252sf_firmware");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/RICOH");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/RICOH');

var asset = tenable_ot::assets::get(vendor:'RICOH');

var vuln_cpes = {
    "cpe:/o:ricoh:sp_c250sf_firmware" :
        {"family" : "MFP"},
    "cpe:/o:ricoh:sp_c252sf_firmware" :
        {"family" : "MFP"},
    "cpe:/o:ricoh:sp_c250dn_firmware:1.05" :
        {"versionEndIncluding" : "1.05", "versionStartIncluding" : "1.05", "family" : "MFP"},
    "cpe:/o:ricoh:sp_c252dn_firmware" :
        {"family" : "MFP"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
VendorProductVersionCPE
ricohsp_c250dn_firmware1.05cpe:/o:ricoh:sp_c250dn_firmware:1.05
ricohsp_c250sf_firmwarecpe:/o:ricoh:sp_c250sf_firmware
ricohsp_c252dn_firmwarecpe:/o:ricoh:sp_c252dn_firmware
ricohsp_c252sf_firmwarecpe:/o:ricoh:sp_c252sf_firmware

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.7%

Related for TENABLE_OT_RICOH_CVE-2019-14299.NASL