{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T20:06:54.692","vulnerabilities":[{"cve":{"id":"CVE-2019-13171","sourceIdentifier":"cve@mitre.org","published":"2020-03-13T19:15:15.277","lastModified":"2024-11-21T04:24:21.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by one or more stack-based buffer overflow vulnerabilities in the Google Cloud Print implementation that would allow an unauthenticated attacker to execute arbitrary code on the device. This was caused by an insecure handling of the register parameters, because the size used within a memcpy() function, which copied the action value into a local variable, was not checked properly."},{"lang":"es","value":"Algunas impresoras Xerox (tal y como la Phaser 3320 versión V53.006.16.000), fueron afectadas por una o más vulnerabilidades de desbordamiento de búfer en la región  stack de la memoria en la implementación de Google Cloud Print que permitiría a un atacante no autenticado ejecutar código arbitrario en el dispositivo. Esto fue causado por un manejo no seguro del parámetro register, porque el tamaño usado dentro de una función memcpy(), que copió el valor de la acción en una variable local, no fue comprobado apropiadamente."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*","matchCriteriaId":"0683FED0-AF80-4717-A556-9B1DA9041F80"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*","matchCriteriaId":"82C5628C-DC4E-472A-9AD8-35C3CA7BD1A9"}]}]}],"references":[{"url":"https://security.business.xerox.com/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://security.business.xerox.com/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}