Published:2024/10/25 Last Updated:2024/10/25
JVNVU#95063136
Multiple vulnerabilities in Sharp and Toshiba Tec MFPs
Overview
Sharp and Toshiba Tec MFPs (multifunction printers) contain multiple vulnerabilities.
Products Affected
As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed below.
Description
MFPs (multifunction printers) provided by Sharp and Toshiba Tec Corporation contain multiple vulnerabilites listed below.
- Out-of-bounds Read (CWE-125)
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Base Score:7.5
- CVE-2024-42420
- Out-of-bounds read vulnerabilities coming from improper processing of keyword search input and improper processing of SOAP messages
- Out-of-bounds Read (CWE-125)
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Base Score:7.5
- CVE-2024-43424
- Out-of-bounds read vulnerability coming from improper processing of HTTP request headers
- Out-of-bounds Read (CWE-125)
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Base Score:4.9
- CVE-2024-45829
- Out-of-bounds read vulnerability in the web page providing data downloading, where query parameters in HTTP requests are improperly processed
- Path traversal (CWE-22)
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Base Score:5.3
- CVE-2024-45842
- Improper processing of URI data in HTTP PUT requests leads to path traversal vulnerability, unintended internal files may be retrieved
- Improper access restriction on some configuration related APIs (CWE-749)
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N Base Score:8.1
- CVE-2024-47005
- Some configuration related APIs are expected to be called by administrative users only, but insufficiently restricted
- Authentication Bypass Using an Alternate Path (CWE-288)
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H Base Score:9.1
- CVE-2024-47406
- Improper processing of HTTP authentication requests may lead to authentication bypass
- Improper processing of query parameters in HTTP requests (CWE-644)
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N Base Score:7.4
- CVE-2024-47549
- Improper processing of query parameters of HTTP requests may allow contamination of unintended data to HTTP response headers
- Reflected Cross-site Scripting (CWE-79)
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N Base Score:7.4
- CVE-2024-47801
- Reflected cross-site scripting vulnerability coming from improper processing of query parameters in HTTP requests
- Stored Cross-site Scripting (CWE-79)
- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N Base Score:6.2
- CVE-2024-48870
- Stored cross-site scripting vulnerability coming from improper input data validation in URI data registration
Impact
- Crafted HTTP requests may cause affected products crashed (CVE-2024-42420, CVE-2024-43424, CVE-2024-45829)
- Internal files may be retrieved when processing crafted HTTP requests (CVE-2024-45842)
- A non-administrative user may execute some configuration APIs (CVE-2024-47005)
- Authentication may be bypassed (CVE-2024-47406)
- Accessing a crafted URL which points to an affected product may cause malicious script executed on the web browser (CVE-2024-47549, CVE-2024-47801)
- If crafted input is stored by an administrative user, malicious script may be executed on the web browsers of other victim users (CVE-2024-48870)
Solution
Update the firmware
Apply the appropriate firmware update according to the information provided by the respective vendors.
Apply workaround
- Use the affected MFPs inside the network protected by firewall, etc.
- Set the administrative password (an initial password is set in the factory-default configuration, see the manual of the product)
- Change the administrative password from the initial configuration, and manage it appropriately
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Sharp Corporation | Vulnerable | 2024/10/25 | Sharp Corporation website |
Toshiba Tec Corporation | Vulnerable | 2024/10/25 | Toshiba Tec Corporation website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Sharp Corporation reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-42420 |
CVE-2024-43424 |
|
CVE-2024-45829 |
|
CVE-2024-45842 |
|
CVE-2024-47005 |
|
CVE-2024-47406 |
|
CVE-2024-47549 |
|
CVE-2024-47801 |
|
CVE-2024-48870 |
|
JVN iPedia |
|
Update History
- 2024/10/25
- Sharp Corporation update status