Toshiba printers use SNMP for configuration. Using the private community, it is possible to remotely execute commands as root on the remote printer. Using this vulnerability will allow any attacker to get a root access on a remote Toshiba printer. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
References
Configurations
No configuration.
History
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jul/1 - | |
References | () https://jvn.jp/en/vu/JVNVU97136265/index.html - | |
References | () https://www.toshibatec.com/information/20240531_01.html - | |
References | () https://www.toshibatec.com/information/pdf/information20240531_01.pdf - |
04 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Jun 2024, 12:43
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Jun 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-14 03:15
Updated : 2024-11-21 09:03
NVD link : CVE-2024-27143
Mitre link : CVE-2024-27143
CVE.ORG link : CVE-2024-27143
JSON object : View
Products Affected
No product.
CWE
CWE-250
Execution with Unnecessary Privileges