{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T14:59:02.216","vulnerabilities":[{"cve":{"id":"CVE-2018-16184","sourceIdentifier":"vultures@jpcert.or.jp","published":"2019-01-09T23:29:04.043","lastModified":"2024-11-21T03:52:14.720","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors."},{"lang":"es","value":"RICOH Interactive Whiteboard D2200, desde la V1.6 hasta la V2.2; D5500, desde la V1.6 hasta la V2.2; D5510, desde la V1.6 hasta la V2.2; y las versiones con pantalla de RICOH Interactive Whiteboard Controller Type1, desde la V1.6 hasta la V2.2 (D5520, D6500, D6510, D7500, D8400), permiten que atacantes remotos ejecuten comandos arbitrarios mediante vectores sin especificar."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricoh:d2200_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6","versionEndIncluding":"2.2","matchCriteriaId":"0F3F42A4-1425-4B49-B1AD-83DA86744B56"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricoh:d2200:-:*:*:*:*:*:*:*","matchCriteriaId":"43293871-70F7-4B1D-956F-9308A860FC85"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricoh:d5500_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6","versionEndIncluding":"2.2","matchCriteriaId":"4DF0ABCA-D8A1-4B36-B812-39801E4C69C5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricoh:d5500:-:*:*:*:*:*:*:*","matchCriteriaId":"D2E56838-5CF4-4997-BCAD-684F8EA3E107"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricoh:d5510_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6","versionEndIncluding":"2.2","matchCriteriaId":"05C3E2C4-BDAF-4AF9-968B-657724690FC8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricoh:d5510:-:*:*:*:*:*:*:*","matchCriteriaId":"B09B5005-77BE-4F68-A7CE-F1D59DAD065C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricoh:d5520_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6","versionEndIncluding":"2.2","matchCriteriaId":"70A94AA2-948E-4B74-9DF6-A0DFF0A128A4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricoh:d5520:-:*:*:*:*:*:*:*","matchCriteriaId":"C4CA9708-C251-4278-983F-B3FA1787B11D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricoh:d6500_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6","versionEndIncluding":"2.2","matchCriteriaId":"7465870D-78A5-47C0-8D31-8ACE35E79168"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricoh:d6500:-:*:*:*:*:*:*:*","matchCriteriaId":"5848E96E-331B-4157-93B0-9DCB6B4B5A6F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricoh:d6510_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6","versionEndIncluding":"2.2","matchCriteriaId":"79C23809-6F15-4AE6-AAF2-E6F5A398B176"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricoh:d6510:-:*:*:*:*:*:*:*","matchCriteriaId":"3DDE0143-ADE4-41E1-8884-2010B7E3EC95"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricoh:d7500_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6","versionEndIncluding":"2.2","matchCriteriaId":"7735F80E-9131-42AC-B86F-0EE9E4A33E96"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricoh:d7500:-:*:*:*:*:*:*:*","matchCriteriaId":"4FD5552E-8242-4E70-8BDD-58D16FF53ABE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricoh:d8400_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6","versionEndIncluding":"2.2","matchCriteriaId":"AA9F9CB7-4ACD-4B73-BCEF-1DA7E86EE651"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricoh:d8400:-:*:*:*:*:*:*:*","matchCriteriaId":"1AB2BD85-80E2-4225-8100-446B9F2BA053"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN55263945/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.ricoh.com/info/2018/1127_1.html","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/en/jp/JVN55263945/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.ricoh.com/info/2018/1127_1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}