Lucene search

K
nessusThis script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.XEROX_XRX19_016.NASL
HistoryJul 29, 2019 - 12:00 a.m.

Xerox WorkCentre Multiple Vulnerabilities (XRX19-016) (URGENT/11)

2019-07-2900:00:00
This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
55

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.93 High

EPSS

Percentile

99.1%

According to its self-reported version, the remote Xerox WorkCentre is affected by multiple remote code execution and denial-of-service vulnerabilities in the IPnet TCP/IP stack. An unauthenticated, remote, attacker could leverage these vulnerabilities to gain full access to the affected device or to cause the device to become unresponsive.

#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(127109);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/06");

  script_cve_id(
    "CVE-2019-12255",
    "CVE-2019-12256",
    "CVE-2019-12257",
    "CVE-2019-12258",
    "CVE-2019-12259",
    "CVE-2019-12260",
    "CVE-2019-12261",
    "CVE-2019-12262",
    "CVE-2019-12263",
    "CVE-2019-12264",
    "CVE-2019-12265"
  );
  script_xref(name:"IAVA", value:"2019-A-0274-S");
  script_xref(name:"CEA-ID", value:"CEA-2019-0679");

  script_name(english:"Xerox WorkCentre Multiple Vulnerabilities (XRX19-016) (URGENT/11)");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the remote Xerox WorkCentre
is  affected by multiple remote code execution and denial-of-service
vulnerabilities in the IPnet TCP/IP stack. An unauthenticated, remote,
attacker could leverage these vulnerabilities to gain full access to
the affected device or to cause the device to become unresponsive.");
  # https://securitydocs.business.xerox.com/wp-content/uploads/2019/07/cert_XRX19-016.pdf
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?94116ec1");
  script_set_attribute(attribute:"see_also", value:"https://armis.com/urgent11/");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate update as described in the Xerox
security bulletin in the referenced URL.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-12262");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/29");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/07/29");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/29");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:xerox:workcentre");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("xerox_workcentre_detect.nasl");
  script_require_keys("www/xerox_workcentre", "www/xerox_workcentre/model", "www/xerox_workcentre/ssw");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

# Get model and system software version
model = get_kb_item_or_exit("www/xerox_workcentre/model");
ver = get_kb_item_or_exit("www/xerox_workcentre/ssw");
ctrl = get_kb_item_or_exit("www/xerox_workcentre/ess");
vuln = FALSE;

ctrl_append = "367972v2";

if (model =~ "^58(45|55|65|75|90)$")
{
  less_or_equal = "072.190.165.14201";
  great_or_equal = "073.190.035.24100";
  fix = "072.190.196.34301";
}
else if (model =~ "^78(45|55)$")
{
  less_or_equal = "072.040.165.14201";
  great_or_equal = "073.040.035.24100";
  fix = "072.040.196.34301";
}
else
  audit(AUDIT_HOST_NOT, "an affected Xerox WorkCentre model");

if (
      ver_compare(ver:ver, fix:less_or_equal, strict:FALSE) <= 0 ||
      ver_compare(ver:ver, fix:great_or_equal, strict:FALSE) >= 0
    )
  vuln = TRUE;
else if (ctrl_append >!< ctrl)
{
  if(report_paranoia < 2)
    audit(AUDIT_POTENTIAL_VULN, "Xerox WorkCentre " + model + " System SW", ver);
  else vuln = TRUE;
}

if(!vuln) audit(AUDIT_INST_VER_NOT_VULN, "Xerox WorkCentre " + model + " System SW", ver);

report =
  '\n  Model                             : Xerox WorkCentre ' + model +
  '\n  Installed system software version : ' + ver +
  '\n  Fixed system software version     : ' + fix + ' and the 367972v2.dlm patch.\n';
security_report_v4(severity:SECURITY_HOLE, port:0, extra:report);
VendorProductVersionCPE
xeroxworkcentrecpe:/h:xerox:workcentre

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.93 High

EPSS

Percentile

99.1%