Vulnerability Details : CVE-2021-28672
Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling.
Vulnerability category: OverflowExecute code
Products affected by CVE-2021-28672
- cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:xerox:versalink_c8000w_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-28672
0.66%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-28672
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2021-28672
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-28672
Jump to