U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-23968

Change History

Initial Analysis 2/03/2022 10:46:19 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:xerox:versalink_firmware:*:*:*:*:*:*:*:* versions up to (including) 42.01
          *cpe:2.3:o:xerox:versalink_firmware:*:*:*:*:*:*:*:* versions from (including) 50.00 up to (including) 50.61
     OR
          cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c8000w:-:*:*:*:*:*:*:*
          cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-835
Changed Reference Type
https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/ No Types Assigned
https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/ Exploit, Third Party Advisory
Changed Reference Type
https://twitter.com/mqudsi/status/1485756915187695618 No Types Assigned
https://twitter.com/mqudsi/status/1485756915187695618 Third Party Advisory