Vulnerability Details : CVE-2022-29588
Konica Minolta bizhub MFP devices before 2022-04-14 use cleartext password storage for the /var/log/nginx/html/ADMINPASS and /etc/shadow files.
Products affected by CVE-2022-29588
- cpe:2.3:o:konicaminolta:bizhub_c759_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c659_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c658_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c558_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c458_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_958_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_808_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_758_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_658e_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_558e_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_458e_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c287_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c227_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_287_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_227_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_368e_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_308e_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c368_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c308_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c258_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_558_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_458_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_368_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_308_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c3851fs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c3851_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c3351_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_4752_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_4052_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c650i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c550i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c450i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c360i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c300i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c250i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_306i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_226i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c4050i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c3350i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c4000i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c3300i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_c3320i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_246i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_367_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:konicaminolta:bizhub_pro958_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-29588
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-29588
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-29588
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-29588
-
http://packetstormsecurity.com/files/167166/Konica-Minolta-bizhub-MFP-Printer-Terminal-Sandbox-Escape.html
Konica Minolta bizhub MFP Printer Terminal Sandbox Escape ≈ Packet StormThird Party Advisory;VDB Entry
-
https://sec-consult.com/vulnerability-lab/
Vulnerability Lab - SEC ConsultThird Party Advisory
Jump to