Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-vwp4-85g8-fgjg
Vulnerability from github
Published
2024-10-25 09:32
Modified
2024-10-25 09:32
Severity ?
Details
Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.
{ affected: [], aliases: [ "CVE-2024-47406", ], database_specific: { cwe_ids: [ "CWE-288", "CWE-306", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2024-10-25T07:15:04Z", severity: "CRITICAL", }, details: "Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.", id: "GHSA-vwp4-85g8-fgjg", modified: "2024-10-25T09:32:00Z", published: "2024-10-25T09:32:00Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-47406", }, { type: "WEB", url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { type: "WEB", url: "https://jvn.jp/en/vu/JVNVU95063136", }, { type: "WEB", url: "https://www.toshibatec.com/information/20241025_01.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", type: "CVSS_V3", }, ], }
cve-2024-47406
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:38
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-90c80_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "210", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70c65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8081_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "160", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b476wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m905_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "612", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "613", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30c25_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "130", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-7580n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8090n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "405", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6070v_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "802", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-c545wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "262", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-c304wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "520", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m90_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "310", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m1206_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "200", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m7570_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "456", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30m35t_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "220", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6070_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-b550wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "260", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b455wz_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "404", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-908_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t2.12.h3.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1058_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1208_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-47406", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T18:33:07.833042Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T18:38:24.503Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.", }, ], metrics: [ { cvssV3_1: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-288", description: "Authentication Bypass Using an Alternate Path or Channel", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:02:10.791Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-47406", datePublished: "2024-10-25T06:18:36.274Z", dateReserved: "2024-10-16T05:26:40.226Z", dateUpdated: "2024-10-25T18:38:24.503Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.