First published: Fri Oct 13 2006(Updated: )
The ESS/ Network Controller and MicroServer Web Server components of Xerox WorkCentre and WorkCentre Pro 232, 238, 245, 255, 265 and 275 allow remote attackers to bypass authentication and execute arbitrary code via "WebUI command injection on TCP/IP hostname."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xerox Workcentre 255 | ||
Xerox Workcentre 245 | ||
Xerox Workcentre 238 | ||
Xerox Workcentre 232 | ||
Xerox Workcentre 232 | ||
Xerox Workcentre 265 | ||
Xerox Workcentre 245 | ||
Xerox Workcentre 238 | ||
Xerox Workcentre 275 | ||
Xerox Workcentre 255 | ||
Xerox Workcentre 275 | ||
Xerox Workcentre 265 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5290 is considered to have a critical severity level due to its ability to allow remote code execution.
To fix CVE-2006-5290, you should apply the latest firmware updates provided by Xerox for the affected WorkCentre models.
CVE-2006-5290 affects several models including Xerox WorkCentre 232, 238, 245, 255, 265, and 275.
CVE-2006-5290 enables attackers to bypass authentication and execute arbitrary code remotely.
Yes, CVE-2006-5290 is a network vulnerability that exploits weaknesses in the web server components of affected Xerox devices.