Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-19363 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
PCL6 Driver for Universal Print Hardware solutions / Drivers PS Driver for Universal Print Hardware solutions / Drivers PC FAX Generic Driver Hardware solutions / Drivers Generic PCL5 Driver Hardware solutions / Drivers RPCS Driver Hardware solutions / Drivers PostScript3 Driver Hardware solutions / Drivers PCL6 (PCL XL) Driver Hardware solutions / Drivers RPCS Raster Driver Hardware solutions / Drivers |
Vendor | RICOH COMPANY, LTD. |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU25569
Risk: Low
CVSSv3.1: 7.6 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C]
CVE-ID: CVE-2019-19363
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper permissions check. A local user can who can login to the computer where the affected printer driver is installed can use a specially crafted printer driver and gain administrative privileges on the target system.
MitigationVendor recommends to download the security program Ver.1.3.0.0.
Printer Driver | Version | Model Name |
---|---|---|
PCL6 Driver for Universal Print | Version 4.0 or later |
|
PS Driver for Universal Print | Version 4.0 or later |
|
PC FAX Generic Driver | All versions |
|
Generic PCL5 Driver | All versions |
|
RPCS Driver | All versions |
|
PostScript3 DriverAndPCL6 (PCL XL) Driver | All versions |
Color MFPs
|
RPCS Raster Driver | All versions |
GELJETs
|
PCL6 Driver for Universal Print: 4.0
PS Driver for Universal Print: 4.0
PC FAX Generic Driver: All versions
Generic PCL5 Driver: All versions
RPCS Driver: All versions
PostScript3 Driver: All versions
PCL6 (PCL XL) Driver: All versions
RPCS Raster Driver: All versions
CPE2.3http://www.ricoh.com/info/2020/0122_1/
http://jvn.jp/en/jp/JVN15697526/index.html
http://support.ricoh.com/bb/html/dr_ut_e/re1/model/Security_Patch/Security_Patch.htm
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.