We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12511

SMB/FTP Address Book Scan Pass-back attack



Description

With address book access, SMB/FTP settings could be modified, redirecting scans and possibly capturing credentials. This requires enabled scan functions and printer access.

Reserved 2024-12-11 | Published 2025-02-03 | Updated 2025-02-03 | Assigner Xerox


HIGH: 7.6CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

Problem types

CWE-269: Improper Privilege Management

Product status

Default status
unknown

Any version before 37.82.53
affected

Default status
unknown

Any version before 38.82.53
affected

Default status
unknown

Any version before 67.82.53
affected

Default status
unknown

Any version before 68.82.53
affected

Default status
unknown

Any version before 32.82.53
affected

Default status
unknown

Any version before 33.82.53
affected

Default status
unknown

Any version before 61.82.53
affected

Default status
unknown

Any version before 62.82.53
affected

Default status
unknown

Any version before 56.75.53
affected

Default status
unknown

Any version before 57.75.53
affected

Default status
unknown

Any version before 58.75.53
affected

Default status
unknown

Any version before 59.24.53
affected

Default status
unknown

Any version before 69.24.53
affected

Default status
unknown

Any version before 70.75.53
affected

Default status
unknown

Any version before 72.75.53
affected

Default status
unknown

Any version before 64.75.53
affected

Default status
unknown

Any version before 65.75.53
affected

References

securitydocs.business.xerox.com/...Phaser-and-WorkCentre.pdf

cve.org (CVE-2024-12511)

nvd.nist.gov (CVE-2024-12511)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-12511

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.