Xerox WorkCentre Command Injection (XRX11-001)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.

Synopsis :

The remote multi-function device may allow arbitrary code execution.

Description :

According to its model number and software version, the remote host
is a Xerox WorkCentre device that reportedly allows an unauthenticated
attacker to execute arbitrary code via specially crafted HTTP requests.

See also :

Solution :

Apply the P45 patch as described in the Xerox security bulletin.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 51901 ()

Bugtraq ID: 46160


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now