ID

VAR-202303-0412


CVE

CVE-2023-23572


TITLE

Seiko Epson printers and network interface products  Web Config  Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2023-000022

DESCRIPTION

Cross-site scripting vulnerability in SEIKO EPSON printers/network interface Web Config allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. [Note] Web Config is the software that allows users to check the status and change the settings of SEIKO EPSON printers/network interface via a web browser. According to SEIKO EPSON CORPORATION, it is also called as Remote Manager in some products. Web Config is pre-installed in some printers/network interface provided by SEIKO EPSON CORPORATION. For the details of the affected product names/model numbers, refer to the information provided by the vendor. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Yokohama National University Mayoya Noma Mr. Yuta Morii Mr. Hiroki Yasui Mr. Takayuki Sasaki Mr. Katsunari Yoshioka MrThe potential impact will vary for each vulnerability, but you may be affected by:・The number of users who accessed the setting screen of the product Web Arbitrary scripts are executed on the browser - CVE-2023-23572 ・If a user who is logged in to the product's setting screen accesses a specially crafted page, the product's settings are changed. - CVE-2023-27520

Trust: 1.62

sources: NVD: CVE-2023-23572 // JVNDB: JVNDB-2023-000022

AFFECTED PRODUCTS

vendor:epsonmodel:lp-s5300rscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s310nscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s3000scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s5300scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw3scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s300nscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s3000zscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-8500cscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s7500scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw7uscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s7100scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s3000psscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s5000scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-9200ps3scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw2scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:esnsb2scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-8200cscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-9300scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-9200cscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s4500scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:pa-w11g2scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s4000scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s7000scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s3500scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-9200bscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:esnsb1scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw2acscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s3000rscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw1sscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s6500scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s7500psscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw1scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s9000scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-9200ps2scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw7scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-9600sscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-8700ps3scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw7sscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-9800cscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw6scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s6000scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-9600scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s5500scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:esifnw1scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s4200scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw2sacscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:lp-s8100scope:eqversion: -

Trust: 1.0

vendor:epsonmodel:pa-w11gscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw3sscope:eqversion: -

Trust: 1.0

vendor:epsonmodel:prifnw2sscope:eqversion: -

Trust: 1.0

vendor:セイコーエプソン株式会社model:web configscope:eqversion:this product has been installed in some seiko epson printers network interface products. please check the information provided by the developer for the products that have been installed.

Trust: 0.8

vendor:セイコーエプソン株式会社model:web configscope:eqversion: -

Trust: 0.8

vendor:セイコーエプソン株式会社model:web configscope:eqversion:according to the developer, in some products remote manager it is said that it is sometimes called.

Trust: 0.8

sources: JVNDB: JVNDB-2023-000022 // NVD: CVE-2023-23572

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-23572
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2023-000022
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202304-913
value: MEDIUM

Trust: 0.6

IPA: JVNDB-2023-000022
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2023-23572
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.7
impactScore: 2.7
version: 3.1

Trust: 1.0

IPA: JVNDB-2023-000022
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-000022 // CNNVD: CNNVD-202304-913 // NVD: CVE-2023-23572

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [IPA evaluation ]

Trust: 0.8

problemtype: Cross-site request forgery (CWE-352) [IPA evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-000022 // NVD: CVE-2023-23572

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202304-913

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-202304-913

PATCH

title:of printers and network interface products Web Config about vulnerabilities inurl:https://www.epson.jp/support/misc_t/230308_oshirase.htm

Trust: 0.8

title:EPSON printer Fixes for cross-site request forgery vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=234196

Trust: 0.6

sources: JVNDB: JVNDB-2023-000022 // CNNVD: CNNVD-202304-913

EXTERNAL IDS

db:NVDid:CVE-2023-23572

Trust: 3.2

db:JVNid:JVN82424996

Trust: 2.4

db:JVNDBid:JVNDB-2023-000022

Trust: 0.8

db:CNNVDid:CNNVD-202304-913

Trust: 0.6

sources: JVNDB: JVNDB-2023-000022 // CNNVD: CNNVD-202304-913 // NVD: CVE-2023-23572

REFERENCES

url:https://jvn.jp/en/jp/jvn82424996/

Trust: 1.6

url:https://www.epson.jp/support/misc_t/230308_oshirase.htm

Trust: 1.6

url:https://jvn.jp/jp/jvn82424996/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-23572

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-27520

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-23572/

Trust: 0.6

sources: JVNDB: JVNDB-2023-000022 // CNNVD: CNNVD-202304-913 // NVD: CVE-2023-23572

SOURCES

db:JVNDBid:JVNDB-2023-000022
db:CNNVDid:CNNVD-202304-913
db:NVDid:CVE-2023-23572

LAST UPDATE DATE

2024-08-14T14:17:22.297000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2023-000022date:2024-06-03T08:34:00
db:CNNVDid:CNNVD-202304-913date:2023-04-19T00:00:00
db:NVDid:CVE-2023-23572date:2023-08-24T13:33:32.147

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2023-000022date:2023-03-08T00:00:00
db:CNNVDid:CNNVD-202304-913date:2023-04-11T00:00:00
db:NVDid:CVE-2023-23572date:2023-04-11T09:15:07.707