Описание
An issue was discovered on Epson WorkForce WF-2861 10.48 LQ22I3, 10.51.LQ20I6 and 10.52.LQ17IA devices. They use SNMP to find certain devices on the network, but the default version is v2c, allowing an amplification attack.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.48_lq22i3:*:*:*:*:*:*:*
cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.51.lq20i6:*:*:*:*:*:*:*
cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.52.lq17ia:*:*:*:*:*:*:*
cpe:2.3:h:epson:epson_workforce_wf-2861:-:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.00334
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-400
Связанные уязвимости
CVSS3: 5.9
github
больше 3 лет назад
An issue was discovered on Epson WorkForce WF-2861 10.48 LQ22I3, 10.51.LQ20I6 and 10.52.LQ17IA devices. They use SNMP to find certain devices on the network, but the default version is v2c, allowing an amplification attack.
EPSS
Процентиль: 56%
0.00334
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-400