Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.
https://www.toshibatec.com/contacts/products/
As for the affected products/models/versions, see the reference URL.
References
Configurations
No configuration.
History
21 Nov 2024, 09:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jul/1 - | |
References | () https://jvn.jp/en/vu/JVNVU97136265/index.html - | |
References | () https://www.toshibatec.com/information/20240531_01.html - | |
References | () https://www.toshibatec.com/information/pdf/information20240531_01.pdf - |
04 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Jun 2024, 12:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-14 04:15
Updated : 2024-11-21 09:04
NVD link : CVE-2024-27173
Mitre link : CVE-2024-27173
CVE.ORG link : CVE-2024-27173
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')