CVE-2020-9330

high-risk
Published 2020-02-21

Certain Xerox WorkCentre printers before 073.xxx.000.02300 do not require the user to reenter or validate LDAP bind credentials when changing the LDAP connector IP address. A malicious actor who gains access to affected devices (e.g., by using default credentials) can change the LDAP connection IP address to a system owned by the actor without knowledge of the LDAP bind credentials. After changing the LDAP connection IP address, subsequent authentication attempts will result in the printer sending plaintext LDAP (Active Directory) credentials to the actor. Although the credentials may belong to a non-privileged user, organizations frequently use privileged service accounts to bind to Active Directory. The attacker gains a foothold on the Active Directory domain at a minimum, and may use the credentials to take over control of the Active Directory domain. This affects 3655*, 3655i*, 58XX*, 58XXi*, 59XX*, 59XXi*, 6655**, 6655i**, 72XX*, 72XXi*, 78XX**, 78XXi**, 7970**, 7970i**, EC7836**, and EC7856** devices.

Do I need to act?

-
0.33% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
NETWORK / LOW complexity

Affected Products (18)

Workcentre 3655 Firmware
Workcentre 3655I Firmware
Workcentre 5845 Firmware
Workcentre 5855 Firmware
Workcentre 5945 Firmware
Workcentre 5955 Firmware
Workcentre 6655 Firmware
Workcentre 6655I Firmware
Workcentre 7220 Firmware
Workcentre 7225 Firmware
Workcentre 7830 Firmware
Workcentre 7835 Firmware
Workcentre 7845 Firmware
Workcentre 7855 Firmware
Workcentre 7970 Firmware
Workcentre 7970I Firmware
Workcentre Ec7836 Firmware
Workcentre Ec7856 Firmware

Affected Vendors

50
/ 100
high-risk
Severity 30/34 · Critical
Exploitability 1/34 · Minimal
Exposure 19/34 · Moderate