{"vulnerability": "CVE-2024-12511", "sightings": [{"uuid": "7535054a-a99e-4433-8391-11be3a82cf63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://t.me/cvedetector/17117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12511 - HP SMB/FTP Settings Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12511 \nPublished : Feb. 3, 2025, 8:15 p.m. | 22\u00a0minutes ago \nDescription : With address book access, SMB/FTP settings could be modified, redirecting scans and possibly capturing credentials. This requires enabled scan functions and printer access. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T22:00:19.000000Z"}, {"uuid": "c876b46a-069c-4a53-a1ef-913abb56fc85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3ligsfz65zp2z", "content": "", "creation_timestamp": "2025-02-18T08:04:45.100742Z"}, {"uuid": "99f43724-7df7-4098-b921-912561d017a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3ligsjkuvha2v", "content": "", "creation_timestamp": "2025-02-18T08:06:43.978999Z"}, {"uuid": "5a05eec7-0b86-46c6-8a1b-a690c83fb39b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lihsiy75nb2g", "content": "", "creation_timestamp": "2025-02-18T17:39:04.561493Z"}, {"uuid": "c8372dfd-4c72-4609-9095-9e0974324308", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2483", "content": "#Threat_Research\nXerox Versalink MFPs\nPass-back attack via LDAP (CVE-2024-12510) and SMB/FTP (CVE-2024-12511)\nhttps://www.rapid7.com/blog/post/2025/02/14/xerox-versalink-c7025-multifunction-printer-pass-back-attack-vulnerabilities-fixed\n]-&gt; Anatomy of a Pass-Back-Attack\n]-&gt; Attacking Xerox\u2019s Multifunction Printers Patch Process\n]-&gt; More", "creation_timestamp": "2025-02-20T05:23:48.000000Z"}, {"uuid": "453efc13-528c-4c71-9a41-20028bd1ff06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://t.me/thehackernews/6357", "content": "\ud83d\udea8 Security vulnerabilities in Xerox VersaLink printers could allow attackers to steal authentication credentials via pass-back attacks, exposing critical systems.\n\nCVE-2024-12510 and CVE-2024-12511 impact LDAP and SMB/FTP services and could lead to compromised Windows Active Directory access.\n\nGet the full details: https://thehackernews.com/2025/02/new-xerox-printer-flaws-could-let.html", "creation_timestamp": "2025-02-18T08:09:42.000000Z"}, {"uuid": "03ac4ebc-0cc1-4dc3-af5e-eef79ceaf0ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11832", "content": "#Threat_Research\nXerox Versalink MFPs\nPass-back attack via LDAP (CVE-2024-12510) and SMB/FTP (CVE-2024-12511)\nhttps://www.rapid7.com/blog/post/2025/02/14/xerox-versalink-c7025-multifunction-printer-pass-back-attack-vulnerabilities-fixed\n]-&gt; Anatomy of a Pass-Back-Attack\n]-&gt; Attacking Xerox\u2019s Multifunction Printers Patch Process\n]-&gt; More", "creation_timestamp": "2025-02-20T02:50:29.000000Z"}, {"uuid": "6eb70bd8-bb99-47a3-b849-ac146de81962", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://t.me/suboxone_chatroom/6751", "content": "\ud83d\udea8 Security vulnerabilities in Xerox VersaLink printers could allow attackers to steal authentication credentials via pass-back attacks, exposing critical systems.\n\nCVE-2024-12510 and CVE-2024-12511 impact LDAP and SMB/FTP services and could lead to compromised Windows Active Directory access.\n\nGet the full details: https://thehackernews.com/2025/02/new-xerox-printer-flaws-could-let.html", "creation_timestamp": "2025-03-25T05:42:41.000000Z"}, {"uuid": "9535f27a-12f1-4fd3-88aa-e39fcf533d9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113941609009302527", "content": "", "creation_timestamp": "2025-02-03T19:29:38.126632Z"}, {"uuid": "004e0354-2bb0-482c-a0dc-77440a54bbdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lilsh6ran22n", "content": "", "creation_timestamp": "2025-02-20T07:48:43.151083Z"}, {"uuid": "fe1813c9-0144-4f5a-90a8-a057aa60c2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://bsky.app/profile/teemutiainen.bsky.social/post/3lily2lwxuw2v", "content": "", "creation_timestamp": "2025-02-20T09:29:04.448129Z"}, {"uuid": "28825004-9c37-4aa4-8a3c-98a011d18b82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://t.me/ton618cyber/6716", "content": "#Threat_Research\nXerox Versalink MFPs\nPass-back attack via LDAP (CVE-2024-12510) and SMB/FTP (CVE-2024-12511)\nhttps://www.rapid7.com/blog/post/2025/02/14/xerox-versalink-c7025-multifunction-printer-pass-back-attack-vulnerabilities-fixed\n]-&gt; Anatomy of a Pass-Back-Attack\n]-&gt; Attacking Xerox\u2019s Multifunction Printers Patch Process\n]-&gt; More", "creation_timestamp": "2025-02-20T05:23:47.000000Z"}, {"uuid": "a492d019-d526-4567-a183-15d68940a598", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhcec765r52r", "content": "", "creation_timestamp": "2025-02-03T20:16:13.640179Z"}, {"uuid": "3ccc1d62-3910-4102-a678-a7ba6770e8d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/114002775076473280", "content": "", "creation_timestamp": "2025-02-14T14:44:57.876948Z"}, {"uuid": "16384224-768a-4326-bdc2-1e54b8960cb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://threatintel.cc/2025/02/14/xerox-versalink-c-multifunction-printer.html", "content": "", "creation_timestamp": "2025-02-14T13:44:52.000000Z"}, {"uuid": "7a44ec87-6167-4bd7-bf83-17785c2896f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "https://bsky.app/profile/rapid7.com/post/3lii4tqjp4c2v", "content": "", "creation_timestamp": "2025-02-18T20:44:05.007315Z"}, {"uuid": "2fd470e3-f4ad-494f-b61a-b529d1f9e3d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12511", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}]}