CVE-2019-14304

CVSS V2 Medium 6.8 CVSS V3 High 8.8
Description
Ricoh SP C250DN 1.06 devices allow CSRF.
Overview
  • CVE ID
  • CVE-2019-14304
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-01-10T18:15:11
  • Last Modified Date
  • 2023-02-01T17:13:49
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:* 1 OR 1.15
cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:* 1 OR 1.15
cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:* 1 OR 1.09
cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:* 1 OR 1.09
cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:* 1 OR 1.02
cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:* 1 OR 1.02
cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:* 1 OR 1.02
cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:* 1 OR 1.02
cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.12
cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.15
cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.13
cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.17
cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.17
cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.13
cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:* 1 OR 1.10
cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:* 1 OR 1.10
cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:* 1 OR 1.10
cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:* 1 OR 1.06
cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:* 1 OR 1.06
cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:* 1 OR 1.10
cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:* 1 OR 1.11
cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:* 1 OR 1.11
cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:* 1 OR 1.11
cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.12
cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.12
cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:* 1 OR 1.12
cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:* 1 OR 1.12
cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:* 1 OR 1.02
cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:* 1 OR 1.04
cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:* 1 OR 1.04
cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:* 1 OR 1.04
cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.08
cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:* 1 OR 1.08
cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_212sfnw_\(china\)_firmware:*:*:*:*:*:*:*:* 1 OR 1.08
cpe:2.3:h:ricoh:sp_212sfnw_\(china\):-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213snw_\(taiwan\)_firmware:*:*:*:*:*:*:*:* 1 OR 1.05
cpe:2.3:h:ricoh:sp_213snw_\(taiwan\):-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:* 1 OR 1.07
cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213sfnw_\(taiwan\)_firmware:*:*:*:*:*:*:*:* 1 OR 1.06
cpe:2.3:h:ricoh:sp_213sfnw_\(taiwan\):-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:* 1 OR 1.06
cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:* 1 OR 1.06
cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213nw_\(taiwan\)_firmware:*:*:*:*:*:*:*:* 1 OR 1.04
cpe:2.3:h:ricoh:sp_213nw_\(taiwan\):-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:* 1 OR 1.06
cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:* 1 OR 1.06
cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
History
Created Old Value New Value Data Type Notes
2022-05-10 16:48:57 Added to TrackCVE
2022-12-04 09:17:29 2020-01-10T18:15Z 2020-01-10T18:15:11 CVE Published Date updated
2022-12-04 09:17:29 2020-02-25T05:15:14 CVE Modified Date updated
2022-12-04 09:17:30 Undergoing Analysis Vulnerability Status updated
2023-02-01 18:09:08 2023-02-01T17:13:49 CVE Modified Date updated
2023-02-01 18:09:08 Undergoing Analysis Analyzed Vulnerability Status updated