First published: Fri Dec 14 2018(Updated: )
Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ricoh MyPrint | =2.2.7 | |
Ricoh MyPrint | =2.9.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18006 refers to the vulnerability in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android, which allows unauthorized access to sensitive information.
CVE-2018-18006 has a severity rating of 9.8, indicating a critical vulnerability.
The affected software is Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android.
CVE-2018-18006 exposes hardcoded credentials in the Ricoh myPrint application, allowing unauthorized access to API secrets, encrypted passwords of mail servers, and names of printed files.
Yes, you can find more information about CVE-2018-18006 at the following references: [Packet Storm Security](http://packetstormsecurity.com/files/150399/Ricoh-myPrint-Hardcoded-Credentials-Information-Disclosure.html) and [Full Disclosure](http://seclists.org/fulldisclosure/2018/Nov/46).