{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T07:59:04.476","vulnerabilities":[{"cve":{"id":"CVE-2023-25954","sourceIdentifier":"vultures@jpcert.or.jp","published":"2023-04-13T04:15:42.547","lastModified":"2025-02-07T17:15:24.900","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"KYOCERA Mobile Print' v3.2.0.230119 and earlier, 'UTAX/TA MobilePrint' v3.2.0.230119 and earlier, and 'Olivetti Mobile Print' v3.2.0.230119 and earlier are vulnerable to improper intent handling. When a malicious app is installed on the victim user's Android device, the app may send an intent and direct the affected app to download malicious files or apps to the device without notification."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-668"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-668"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kyocera:mobile_print:*:*:*:*:*:android:*:*","versionEndIncluding":"3.2.0.230119","matchCriteriaId":"707E2FE3-3905-438C-B99D-68ED1A7B313D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:triumph-adler:mobile_print:*:*:*:*:*:android:*:*","versionEndIncluding":"3.2.0.230119","matchCriteriaId":"9AF4FB63-4E20-471D-82FF-98CC7E1F27F9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:olivetti:mobile_print:*:*:*:*:*:android:*:*","versionEndIncluding":"3.2.0.230119","matchCriteriaId":"E3E7E34D-C04F-4957-89E9-F788BC0B6797"}]}]}],"references":[{"url":"https://jvn.jp/en/vu/JVNVU98434809/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://play.google.com/store/apps/details?id=com.kyocera.kyoprint","source":"vultures@jpcert.or.jp","tags":["Product"]},{"url":"https://play.google.com/store/apps/details?id=com.kyocera.kyoprintolivetti","source":"vultures@jpcert.or.jp","tags":["Product"]},{"url":"https://play.google.com/store/apps/details?id=com.kyocera.kyoprinttautax","source":"vultures@jpcert.or.jp","tags":["Product"]},{"url":"https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2023-04-11.html","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/en/vu/JVNVU98434809/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://play.google.com/store/apps/details?id=com.kyocera.kyoprint","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://play.google.com/store/apps/details?id=com.kyocera.kyoprintolivetti","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://play.google.com/store/apps/details?id=com.kyocera.kyoprinttautax","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2023-04-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}