Action not permitted
Modal body text goes here.
Modal Title
Modal Body
jvndb-2024-011256
Vulnerability from jvndb
Published
2024-10-28 17:33
Modified
2024-10-28 17:33
Severity ?
Summary
Multiple vulnerabilities in Sharp and Toshiba Tec MFPs
Details
MFPs (multifunction printers) provided by Sharp and Toshiba Tec Corporation contain multiple vulnerabilites listed below.
<ul>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-42420</li>
<li>Out-of-bounds read vulnerabilities coming from improper processing of keyword search input and improper processing of SOAP messages</li>
</ul>
</li>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-43424</li>
<li>Out-of-bounds read vulnerability coming from improper processing of HTTP request headers</li>
</ul>
</li>
<li>Out-of-bounds Read (CWE-125)
<ul>
<li>CVE-2024-45829</li>
<li>Out-of-bounds read vulnerability in the web page providing data downloading, where query parameters in HTTP requests are improperly processed</li>
</ul>
</li>
<li>Path traversal (CWE-22)
<ul>
<li>CVE-2024-45842</li>
<li>Improper processing of URI data in HTTP PUT requests leads to path traversal vulnerability, unintended internal files may be retrieved</li>
</ul>
</li>
<li>Improper access restriction on some configuration related APIs (CWE-749)
<ul>
<li>CVE-2024-47005</li>
<li>Some configuration related APIs are expected to be called by administrative users only, but insufficiently restricted</li>
</ul>
</li>
<li>Authentication Bypass Using an Alternate Path (CWE-288)
<ul>
<li>CVE-2024-47406</li>
<li>Improper processing of HTTP authentication requests may lead to authentication bypass</li>
</ul>
</li>
<li>Improper processing of query parameters in HTTP requests (CWE-644)
<ul>
<li>CVE-2024-47549</li>
<li>Improper processing of query parameters of HTTP requests may allow contamination of unintended data to HTTP response headers</li>
</ul>
</li>
<li>Reflected Cross-site Scripting (CWE-79)
<ul>
<li>CVE-2024-47801</li>
<li>Reflected cross-site scripting vulnerability coming from improper processing of query parameters in HTTP requests</li>
</ul>
</li>
<li>Stored Cross-site Scripting (CWE-79)
<ul>
<li>CVE-2024-48870</li>
<li>Stored cross-site scripting vulnerability coming from improper input data validation in URI data registration</li>
</ul>
</li>
</ul>
Sharp Corporation reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011256.html", "dc:date": "2024-10-28T17:33+09:00", "dcterms:issued": "2024-10-28T17:33+09:00", "dcterms:modified": "2024-10-28T17:33+09:00", description: "MFPs (multifunction printers) provided by Sharp and Toshiba Tec Corporation contain multiple vulnerabilites listed below.\r\n\r\n<ul>\r\n\t<li>Out-of-bounds Read (CWE-125)\r\n\t<ul>\r\n\t\t<li>CVE-2024-42420</li>\r\n\t\t<li>Out-of-bounds read vulnerabilities coming from improper processing of keyword search input and improper processing of SOAP messages</li>\r\n\t</ul>\r\n\t</li>\r\n\t<li>Out-of-bounds Read (CWE-125)\r\n\t<ul>\r\n\t\t<li>CVE-2024-43424</li>\r\n\t\t<li>Out-of-bounds read vulnerability coming from improper processing of HTTP request headers</li>\r\n\t</ul>\r\n\t</li>\r\n\t<li>Out-of-bounds Read (CWE-125)\r\n\t<ul>\r\n\t\t<li>CVE-2024-45829</li>\r\n\t\t<li>Out-of-bounds read vulnerability in the web page providing data downloading, where query parameters in HTTP requests are improperly processed</li>\r\n\t</ul>\r\n\t</li>\r\n\t<li>Path traversal (CWE-22)\r\n\t<ul>\r\n\t\t<li>CVE-2024-45842</li>\r\n\t\t<li>Improper processing of URI data in HTTP PUT requests leads to path traversal vulnerability, unintended internal files may be retrieved</li>\r\n\t</ul>\r\n\t</li>\r\n\t<li>Improper access restriction on some configuration related APIs (CWE-749)\r\n\t<ul>\r\n\t\t<li>CVE-2024-47005</li>\r\n\t\t<li>Some configuration related APIs are expected to be called by administrative users only, but insufficiently restricted</li>\r\n\t</ul>\r\n\t</li>\r\n\t<li>Authentication Bypass Using an Alternate Path (CWE-288)\r\n\t<ul>\r\n\t\t<li>CVE-2024-47406</li>\r\n\t\t<li>Improper processing of HTTP authentication requests may lead to authentication bypass</li>\r\n\t</ul>\r\n\t</li>\r\n\t<li>Improper processing of query parameters in HTTP requests (CWE-644)\r\n\t<ul>\r\n\t\t<li>CVE-2024-47549</li>\r\n\t\t<li>Improper processing of query parameters of HTTP requests may allow contamination of unintended data to HTTP response headers</li>\r\n\t</ul>\r\n\t</li>\r\n\t<li>Reflected Cross-site Scripting (CWE-79)\r\n\t<ul>\r\n\t\t<li>CVE-2024-47801</li>\r\n\t\t<li>Reflected cross-site scripting vulnerability coming from improper processing of query parameters in HTTP requests</li>\r\n\t</ul>\r\n\t</li>\r\n\t<li>Stored Cross-site Scripting (CWE-79)\r\n\t<ul>\r\n\t\t<li>CVE-2024-48870</li>\r\n\t\t<li>Stored cross-site scripting vulnerability coming from improper input data validation in URI data registration</li>\r\n\t</ul>\r\n\t</li>\r\n</ul>\r\n\r\nSharp Corporation reported these vulnerabilities to JPCERT/CC to notify users of its solution through JVN.", link: "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-011256.html", "sec:cpe": [ { "#text": "cpe:/a:sharp:multiple_product", "@product": "(Multiple Products)", "@vendor": "Sharp Corporation", "@version": "2.2", }, { "#text": "cpe:/a:toshibatec:multiple_product", "@product": "(Multiple Products)", "@vendor": "TOSHIBA TEC", "@version": "2.2", }, ], "sec:cvss": { "@score": "9.1", "@severity": "Critical", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "@version": "3.0", }, "sec:identifier": "JVNDB-2024-011256", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU95063136/index.html", "@id": "JVNVU#95063136", "@source": "JVN", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-42420", "@id": "CVE-2024-42420", "@source": "CVE", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-43424", "@id": "CVE-2024-43424", "@source": "CVE", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-45829", "@id": "CVE-2024-45829", "@source": "CVE", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-45842", "@id": "CVE-2024-45842", "@source": "CVE", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47005", "@id": "CVE-2024-47005", "@source": "CVE", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47406", "@id": "CVE-2024-47406", "@source": "CVE", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47549", "@id": "CVE-2024-47549", "@source": "CVE", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-47801", "@id": "CVE-2024-47801", "@source": "CVE", }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-48870", "@id": "CVE-2024-48870", "@source": "CVE", }, { "#text": "https://cwe.mitre.org/data/definitions/125.html", "@id": "CWE-125", "@title": "Out-of-bounds Read(CWE-125)", }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)", }, { "#text": "https://cwe.mitre.org/data/definitions/288.html", "@id": "CWE-288", "@title": "Authentication Bypass Using an Alternate Path or Channel(CWE-288)", }, { "#text": "https://cwe.mitre.org/data/definitions/644.html", "@id": "CWE-644", "@title": "Improper Neutralization of HTTP Headers for Scripting Syntax(CWE-644)", }, { "#text": "https://cwe.mitre.org/data/definitions/749.html", "@id": "CWE-749", "@title": "Exposed Dangerous Method or Function(CWE-749)", }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)", }, ], title: "Multiple vulnerabilities in Sharp and Toshiba Tec MFPs", }
cve-2024-42420
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:37
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs contain multiple Out-of-bounds Read vulnerabilities, due to improper processing of keyword search input and improper processing of SOAP messages.
Crafted HTTP requests may cause affected products crashed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation. |
||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-90c80_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "210", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70c65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8081_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "160", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "613", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30c25_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "130", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-7580n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8090n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "405", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6070v_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "802", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-c545wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "262", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-c304wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "520", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m90_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "310", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m1206_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "200", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m7570_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "456", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30m35t_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "220", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b476wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m905_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "612", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6070_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-b550wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "260", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b455wz_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "404", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-908_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t2.12.h3.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1058_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1208_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-42420", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T18:35:04.039058Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T18:37:13.542Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation.", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs contain multiple Out-of-bounds Read vulnerabilities, due to improper processing of keyword search input and improper processing of SOAP messages.\r\nCrafted HTTP requests may cause affected products crashed.", }, ], metrics: [ { cvssV3_1: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "Out-of-bounds read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:01:42.113Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-42420", datePublished: "2024-10-25T06:18:00.481Z", dateReserved: "2024-10-16T05:26:36.361Z", dateUpdated: "2024-10-25T18:37:13.542Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-48870
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 14:15
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs improperly validate input data in URI data registration, resulting in a stored cross-site scripting vulnerability.
If crafted input is stored by an administrative user, malicious script may be executed on the web browsers of other victim users.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Toshiba Tec Corporation | e-STUDIO 908 |
Version: T2.12.h3.00 and earlier versions |
||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-48870", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:15:05.890283Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T14:15:16.927Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs improperly validate input data in URI data registration, resulting in a stored cross-site scripting vulnerability.\r\nIf crafted input is stored by an administrative user, malicious script may be executed on the web browsers of other victim users.", }, ], metrics: [ { cvssV3_1: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Cross-site scripting (XSS)", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:02:25.999Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-48870", datePublished: "2024-10-25T06:18:57.297Z", dateReserved: "2024-10-16T05:26:39.202Z", dateUpdated: "2024-10-25T14:15:16.927Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-43424
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 17:16
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs improperly process HTTP request headers, resulting in an Out-of-bounds Read vulnerability.
Crafted HTTP requests may cause affected products crashed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-90c80_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "210", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70c65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8081_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "160", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "613", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30c25_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "130", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-7580n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8090n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "405", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6070v_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "802", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-c545wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "262", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-c304wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "520", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m90_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "310", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m1206_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "200", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m7570_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "456", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30m35t_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "220", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b476wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m905_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "612", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6070_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-b550wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "260", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b455wz_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "404", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-908_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t2.12.h3.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1058_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1208_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-43424", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:18:09.827242Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T17:16:12.736Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs improperly process HTTP request headers, resulting in an Out-of-bounds Read vulnerability.\r\nCrafted HTTP requests may cause affected products crashed.", }, ], metrics: [ { cvssV3_1: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "Out-of-bounds read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:01:48.353Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-43424", datePublished: "2024-10-25T06:18:10.875Z", dateReserved: "2024-10-16T05:26:45.607Z", dateUpdated: "2024-10-25T17:16:12.736Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-47549
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:32
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs improperly process query parameters in HTTP requests, which may allow contamination of unintended data to HTTP response headers.
Accessing a crafted URL which points to an affected product may cause malicious script executed on the web browser.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-47549", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T18:32:15.403947Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T18:32:25.798Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs improperly process query parameters in HTTP requests, which may allow contamination of unintended data to HTTP response headers.\r\nAccessing a crafted URL which points to an affected product may cause malicious script executed on the web browser.", }, ], metrics: [ { cvssV3_1: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-644", description: "Improper Neutralization of HTTP Headers for Scripting Syntax", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:02:15.707Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-47549", datePublished: "2024-10-25T06:18:42.287Z", dateReserved: "2024-10-16T05:26:38.340Z", dateUpdated: "2024-10-25T18:32:25.798Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-47005
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:38
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs provide configuration related APIs. They are expected to be called by administrative users only, but insufficiently restricted.
A non-administrative user may execute some configuration APIs.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1058_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-90c80_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "210", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70c65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8081_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "160", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "613", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30c25_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "130", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-7580n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8090n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "405", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6070v_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "802", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1208_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-c545wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "262", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-c304wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "520", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m90_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "310", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m1206_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "200", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m7570_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "456", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30m35t_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "220", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b476wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m905_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "612", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6070_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-b550wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "260", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b455wz_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "404", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-908_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t2.12.h3.00", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-47005", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T18:33:28.662590Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T18:38:02.777Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs provide configuration related APIs. They are expected to be called by administrative users only, but insufficiently restricted.\r\nA non-administrative user may execute some configuration APIs.", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-749", description: "Exposed dangerous method or function", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:02:05.781Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-47005", datePublished: "2024-10-25T06:18:30.415Z", dateReserved: "2024-10-16T05:26:37.236Z", dateUpdated: "2024-10-25T18:38:02.777Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-47801
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 14:16
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs improperly process query parameters in HTTP requests, resulting in a reflected cross-site scripting vulnerability.
Accessing a crafted URL which points to an affected product may cause malicious script executed on the web browser.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-47801", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:16:37.011885Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T14:16:46.537Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs improperly process query parameters in HTTP requests, resulting in a reflected cross-site scripting vulnerability.\r\nAccessing a crafted URL which points to an affected product may cause malicious script executed on the web browser.", }, ], metrics: [ { cvssV3_1: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "Cross-site scripting (XSS)", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:02:20.957Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-47801", datePublished: "2024-10-25T06:18:50.793Z", dateReserved: "2024-10-16T05:26:34.127Z", dateUpdated: "2024-10-25T14:16:46.537Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-45829
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:34
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs provide the web page to download data, where query parameters in HTTP requests are improperly processed and resulting in an Out-of-bounds Read vulnerability.
Crafted HTTP requests may cause affected products crashed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-45829", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T18:34:43.043642Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T18:34:50.895Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs provide the web page to download data, where query parameters in HTTP requests are improperly processed and resulting in an Out-of-bounds Read vulnerability.\r\nCrafted HTTP requests may cause affected products crashed.", }, ], metrics: [ { cvssV3_1: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "Out-of-bounds read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:01:54.565Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-45829", datePublished: "2024-10-25T06:18:17.317Z", dateReserved: "2024-10-16T05:26:41.085Z", dateUpdated: "2024-10-25T18:34:50.895Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-47406
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-10-25 18:38
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-90c80_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "210", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70c65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8081_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "160", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b476wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m905_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "612", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "613", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30c25_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "130", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-7580n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8090n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "405", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6070v_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "802", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-c545wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "262", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-c304wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "520", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m90_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "310", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m1206_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "200", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m7570_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "456", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30m35t_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "220", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6070_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-b550wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "260", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b455wz_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "404", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-908_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t2.12.h3.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1058_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1208_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-47406", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T18:33:07.833042Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T18:38:24.503Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs improperly process HTTP authentication requests, resulting in an authentication bypass vulnerability.", }, ], metrics: [ { cvssV3_1: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-288", description: "Authentication Bypass Using an Alternate Path or Channel", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:02:10.791Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-47406", datePublished: "2024-10-25T06:18:36.274Z", dateReserved: "2024-10-16T05:26:40.226Z", dateUpdated: "2024-10-25T18:38:24.503Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-45842
Vulnerability from cvelistv5
Published
2024-10-25 06:18
Modified
2024-12-03 17:11
Severity ?
EPSS score ?
Summary
Sharp and Toshiba Tec MFPs improperly process URI data in HTTP PUT requests resulting in a path Traversal vulnerability.
Unintended internal files may be retrieved when processing crafted HTTP requests.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sharp Corporation | Sharp Digital Full-color MFPs and Monochrome MFPs |
Version: see the information provided by Sharp Corporation |
||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1058_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1058_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-90c70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-90c80_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-90c80_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "210", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50c65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-55c26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-60c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70c65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70c65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8081_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8081_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "160", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3561s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4061s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "613", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30c25t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25z_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30c25_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30c25_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "130", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-6580n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-7580n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-7580n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-7090n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-8090n_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-8090n_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "405", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-2630n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3550v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6050v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3560v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-3570v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4060v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-4070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-5070v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-6070v_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-6070v_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "802", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-1208_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-1208_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t1.01.h4.00", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-c533wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c533wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c535wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c542wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-c545wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-c545wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "262", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-c303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c303wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-c304wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-c304wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "520", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-70m75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m90_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m90_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "310", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-50m26_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-50m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m36_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-70m65_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-70m65_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "320", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m1056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m1206_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m1206_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "200", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m6570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m7570_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m7570_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "456", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m5051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2651_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3571s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5071s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6071s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6071s_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-30m28_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m28t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m31t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-30m35t_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-30m35t_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "220", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b356w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b356wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b376wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b456wh_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b476wh_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b476wh_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "413", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m905_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m905_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "612", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-m3550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m3570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m4070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m5070_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-m6070_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-m6070_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "503", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:bp-b537wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b540wr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b547wd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:bp-b550wd_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "bp-b550wd_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "260", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:sharp:mx-b355w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b355wz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:mx-b455wz_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "mx-b455wz_firmware", vendor: "sharp", versions: [ { lessThanOrEqual: "404", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:toshibatec:e-studio-908_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "e-studio-908_firmware", vendor: "toshibatec", versions: [ { lessThanOrEqual: "t2.12.h3.00", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-45842", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T18:33:42.556743Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-03T17:11:31.613Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Sharp Digital Full-color MFPs and Monochrome MFPs", vendor: "Sharp Corporation", versions: [ { status: "affected", version: "see the information provided by Sharp Corporation", }, ], }, { product: "e-STUDIO 908", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T2.12.h3.00 and earlier versions", }, ], }, { product: "e-STUDIO 1058", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, { product: "e-STUDIO 1208", vendor: "Toshiba Tec Corporation", versions: [ { status: "affected", version: "T1.01.h4.00 and earlier versions", }, ], }, ], descriptions: [ { lang: "en", value: "Sharp and Toshiba Tec MFPs improperly process URI data in HTTP PUT requests resulting in a path Traversal vulnerability.\r\nUnintended internal files may be retrieved when processing crafted HTTP requests.", }, ], metrics: [ { cvssV3_1: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "Improper limitation of a pathname to a restricted directory ('Path Traversal')", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-25T09:02:00.482Z", orgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", shortName: "jpcert", }, references: [ { url: "https://jvn.jp/en/vu/JVNVU95063136/", }, { url: "https://global.sharp/products/copier/info/info_security_2024-10.html", }, { url: "https://www.toshibatec.com/information/20241025_01.html", }, ], }, }, cveMetadata: { assignerOrgId: "ede6fdc4-6654-4307-a26d-3331c018e2ce", assignerShortName: "jpcert", cveId: "CVE-2024-45842", datePublished: "2024-10-25T06:18:23.519Z", dateReserved: "2024-10-16T05:26:44.298Z", dateUpdated: "2024-12-03T17:11:31.613Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.